Archive for Access Control

Revolutionary Applications of DensePose From WiFi: Enhancing Corporate Security and Empowering Military Tactical Teams

Example DensePose Image vs WiFiCutting-edge technologies continue to push the boundaries of what is possible in the realm of wireless communication and security applications.  It seems like every week there is something new in the technology front that enhances our capabilities in the security world.  Most notably since the revelation of ChatGPT, almost everything recently seems to be “AI” (artificial intelligence) based technology.  Cornell University’s groundbreaking research on DensePose From WiFi has emerged as a game-changer, revolutionizing how we perceive and utilize Wi-Fi signals. This article delves into the potential implications of that technology in corporate security for occupancy and muster reporting, as well as exploring its potential for portable deployment variations for military and tactical teams to visualize assailants through walls and barriers.

Understanding DensePose From WiFi (DensePose WiFi)

DensePose From WiFi is a pioneering research project that harnesses the power of radio frequency (RF) signals to track and analyze human movements in a given area. The technology leverages the existing Wi-Fi infrastructure and transforms it into a sophisticated motion-capture system. By analyzing the reflections and refractions of Wi-Fi signals as they interact with the human body, DensePose can generate accurate 3D representations of people’s movements in real-time.  The technology is based off of previous research (called simply DensePose) that utilizes video images with deep learning networks to correlate video camera imaging data to map the estimations of human body poses within its field of view.  DensePose’s objective is to provide human pose estimation that aims at mapping all human pixels of an RGB image to the 3D surface of the human body.   DensePose From WiFi took the video technology, paired it with WiFi data to feed into an AI deep learning model, and then took away the camera feed.  The result is an imaging capability just using radio waves.  Think of it as a type of bat sonar, except using signals from WiFi routers that can see further, and potentially through walls and other objects.

 

The first row illustrates the hardware setup. The second and third rows are the clips of amplitude and phase of the input WiFi signal. The fourth row contains the dense pose estimation of our algorithm from only the WiFi signal.

Corporate Security: Occupancy and Muster Reporting

One of the most promising beneficial applications of DensePose WiFi lies in enhancing corporate security measures, particularly in the realm of occupancy and muster reporting. Traditional methods of monitoring people’s presence within a building rely on physical sensors such as In/Out card readers, AI cameras, mustering point check-in readers, or even manual headcounts, which can be time-consuming and prone to inaccuracies, especially with visitors. However, with DensePose WiFi, businesses can now leverage their existing Wi-Fi infrastructure to precisely track and report the occupancy of various spaces to determine if a space, or even an entire floor, are “all clear”.  An entire building could be scanned within seconds to determine if the building is clear, and if not, provide security or first responders with the floor and exact location where those remaining individuals are.

When integrated with an intelligent security system, DensePose WiFi can monitor the flow of employees throughout a building, ensuring that everyone is accounted for in case of emergencies or evacuation drills. This technology enables real-time muster reporting, providing an accurate headcount and identifying any areas that may require immediate attention during critical situations.

Other potential applications could include patient wandering systems for hospitals, vacancy verification, or even automatic threat assessment alarms generated by certain poses which represent an obvious threat (gun aiming posture, headlock, standing over another person, etc).

Enhancing Security for Military Tactical Teams

The potential applications of DensePose WiFi extend beyond corporate settings and can prove to be invaluable for military tactical teams. In scenarios where situational awareness is crucial, such as hostage rescue missions or urban combat, this technology can be a game-changer.

By outfitting military personnel with lightweight and portable (or perhaps weapon mounted with heads-up display) Wi-Fi like transceivers, tactical teams can effectively “see” through walls or other obstructions. DensePose WiFi would allow operators to detect and track the movements of individuals on the other side of barriers, providing vital intelligence before initiating any tactical actions. This enhanced situational awareness could save lives and offer a considerable advantage in complex and high-stakes operations.

Ethical Considerations and Privacy Concerns

While DensePose WiFi presents tremendous potential for improving security measures, it also raises ethical and privacy concerns. The technology’s ability to generate 3D representations of human movements demands a delicate balance between security and individual privacy. Striking this balance will be crucial for ensuring public acceptance and responsible deployment of this technology in various domains.

DensePose WiFi represents an exciting leap forward in the realms of security and wireless communication. Its applications in corporate security for occupancy and muster reporting promise increased efficiency and safety in emergencies, while its potential use in military tactical scenarios offers unprecedented situational awareness. As this technology continues to evolve, it is essential to address ethical considerations and privacy concerns to foster its responsible adoption and ensure a secure and ethical future for all.

 

Posted in: Access Control, New Equipment and Gadgets, Security Technology

Leave a Comment (0) →

The Importance of Security Consultants in Designing Effective Security Systems

In an ever-evolving world with increasing security concerns, it has become imperative for businesses and organizations to prioritize the implementation of robust security systems. However, choosing the right approach and ensuring an effective security setup is not always straightforward.  A renewed trend that was prevalent a couple of decades ago was for integrators to offer “consulting and design services’.   Often, businesses rely on security integrators to design and install their security systems, and for certain size projects that makes sense.  Why hire an outside consultant to design a small retrofit project?    While security integrators play a crucial role, there are significant benefits to involving a security consultant in the design process. In this article, we will explore the virtues of using a security consultant and highlight examples of where security installers have fallen short or encountered conflicts of interest.

  1. Unbiased Expertise: A security consultant brings a unique perspective and unbiased expertise to the table. Unlike security integrators who are often affiliated with specific brands or manufacturers, security consultants have a broader understanding of the security landscape and can offer impartial advice. Their experience in assessing risks and designing comprehensive security strategies ensures that the resulting system is tailored to the specific needs of the organization.   We don’t sell or install anything, and thus have no particular preference for what products the client may choose to consider for their project.  That doesn’t mean we won’t make recommendations about their requested choices (see our past articles about our strong feelings on putting corporate security data in the cloud or using NDAA banned products).  The short version:  if your consultant receives remuneration from a manufacturer or vendor for the products they specify, find another consultant.
  2. Conflict of Interest: One of the key concerns when relying solely on security integrators is the potential for conflicts of interest.  Integrators may be motivated to prioritize their own profit margins or partner relationships over the best interests of the client. This can lead to compromised system designs, subpar equipment selection, or inadequate coverage.   You may be sold a particular brand or product line because there is a sales goal incentive being pushed by management or the manufacturer.   Worse, it is not uncommon for integrators to unload poor selling product or superseded parts in order to clean up their inventory.   This is fine if the client is aware and accepts the product (presumably for a discount), but sometimes it is done without their knowledge.  By involving a security consultant, businesses can mitigate these conflicts and ensure that their security system is designed with their unique requirements in mind.
  3. Prevent Poor Project Management:  Integrators will often bake in “project management” and “system check out” line item fees in their proposals, claiming to offer project management and punch list services for their own installation phase.   This is very much like having the fox watch the hen-house.  In one recent case, we saw a project where a vendor substituted the installed camera
    Poor project management and no punch list results in poor installations.

    Poor project management and no punch list results in poor installations.

    models with inferior (cheaper) models AFTER they received the bid award and purchase order.   The client didn’t catch it, but we did during project field inspections.   Never let the integrator perform their own punch list and acceptance testing.

  4. Post Installation Documentation:   Trying to get as-built documentation is often another problem.   While almost nobody likes doing as-built drawings, their value should never be underestimated.  Ask anyone who has done a retrofit project without them.  If the client does not hold back a percentage of payment until all punch list items are complete and all as-built documentation is submitted, then the likelihood of that work ever being done without further consideration can be very low.  Too, often the integrator will simply take the original design drawings and update them slightly (or not at all) and turn them in as the as-built documentation.  That is insufficient.  Good as-built documents include the original equipment list (mfr/model, qty, serial #s, IP addresses, power, etc) and locations, riser diagrams, installation details, as well as the point-to-point wiring and configuration details for every piece of installed equipment.   If the vendor uses a tool like System Surveyor or Fieldwire, ask for the full report to be printed to PDF and included in the as-built documentation.  (You may also want to request they delete the data being stored on the cloud if your organization has data retention policies that concern this situation).
  5. Comprehensive Risk Assessment: Security consultants conduct thorough risk assessments to identify potential vulnerabilities and areas of concern. This includes evaluating physical vulnerabilities, assessing technological risks, and analyzing procedural weaknesses. By considering these factors during the design phase, consultants can develop an integrated security system that addresses identified risks, ultimately providing greater protection against potential threats.  This may include out-of-scope items that may not be viable under the current project funding, but can be provided to the client so the cost can be projected under future budgets or other projects which can resolve the issue.
  6. Future-Proofing: Security systems should be adaptable and scalable to meet evolving security requirements. Integrators might focus solely on immediate needs, potentially overlooking future expansion or technological advancements that may be outside the scope of their work or capabilities.  Security consultants, however, take a holistic approach by considering the long-term goals and growth plans of the organization. This ensures that the security system is flexible and can accommodate future upgrades or changes without significant disruptions or additional costs.

While security definitely integrators play a critical role in the installation of security systems, involving a security consultant during the design and project management phases offers numerous advantages. Their unbiased expertise, ability to identify vulnerabilities, and focus on long-term planning can significantly enhance the effectiveness of a security system. By avoiding conflicts of interest and addressing potential pitfalls, businesses can ensure a comprehensive and robust security solution tailored to their specific needs.

Remember, investing in the services of a security consultant is an investment in the long-term safety and security of your organization. Don’t leave the design of your security system to chance—seek the guidance of an expert to achieve the peace of mind you deserve.

Posted in: Access Control, CPTED, Premises Liability, Security Consulting, Security Technology, Vulnerability Analysis

Leave a Comment (0) →

Lockset Functions

This article was taken from another website and modified to add some additional details. I was looking online for some simple definitions of lockset types and found this page by The Flying Locksmiths. I have no connection to this business and they don’t even know who I am, but I liked the information so much I decided to post it here with a credit to them for the good work.

Here is some common industry knowledge and terminology to help make you a more informed consumer:

(There are other functions outside these five, but they are far less common and only needed in special circumstances.)

1. Entry Lockset Function. This is the most common type of lock and chances are, you probably have them on your home or office now. An entry function lockset will have a small button or rotating lever on the inside of the knob/lever handle, allowing you to manually lock the door  when you choose. Most types will allow you to push the button in or push it in and turn the button, causing the lock to remain locked, even after a key is inserted and used. You will most commonly find them on residential homes, on front and back doors.  Deadbolt locks very common in homes and  are auxiliary type locks that have a bolt that extends into the strike plate and supporting door jamb, activated by rotating lever knob or a key.  Sometimes the key operation is on both sides of the lock. 

2. Storeroom Lockset Function. This particular lock, is always locked and requires a key to be used each time you want to enter. There is no button on the inside and does not come with an option to leave the door open. It’s perfect for commercial uses, on a supply closet, because it will ensure that the door is locked, as long as it’s closed. You don’t want anyone stealing those pens and papers!

3. Classroom Lockset Function. Classroom function is used for exactly what you would think, a classroom! Much like to the storeroom function lockset, this lock does not have a button on the inside. However, it DOES have the ability to be left unlock, but ONLY with a key. A full turn will lock or unlock the knob/lever, allowing only the person with the correct key to leave the door open. It’s a great lock for anyone who doesn’t want to leave a door open, unless they authorize it to be.

4. Privacy Lockset Function. This lockset is used primarily in bathrooms and/or bedrooms, intended for the purpose its name suggests; privacy. They will most often have a small hole on the outside, and a push button on the inside. The small hole on the outside can be opened with any kind of pin or paperclip, simply by pushing it in. They are not designed to be used as a main locking device, but just a means to keep someone from walking in when you are using the bathroom or getting dressed in a bedroom.

5. Passage Lockset Function. This is hardly a “real” lock at all! This knob lever doesn’t actually lock, it just keeps the door latched to the frame, so they don’t blow around in the wind. You will commonly find them on closets in a home or doors that just don’t need to be locked in general. Some people will also use them on bedrooms, so you can close the door, but not lock it.

 

Posted in: Access Control, Company News

Leave a Comment (0) →

NEC and Conduit Fills for Communications and Security Cabling

A question that comes up frequently for us when working on security projects with high density device counts is conduit fill.   That National Electrical Code typically wants to limit conduit fill to less than 40% of the capacity for cables in the raceway.  This is based upon the dimensions of the conductors and the potential for “jamming” or stressing the cable and potential thermal issues that could lead to electrical fires.  This is referenced to apply to power cabling for AC power conductors.

We all know (or should know) that metallic low voltage communications cabling (e.g. CAT6 network, dry contact devices, card readers, etc) can’t be run in the same conduit as AC power cabling, so what is the limitation for conduit fill for low voltage security cabling?

Whenever you are in doubt, you should always consult with the AHJ, but in reality the NEC basically doesn’t care and it will likely never be inspected.  The manufacturers of these cables may have some recommendations on maximum fill ratings to reduce the pulling tension to minimize stretching or damaging the cable, however.  There are other factors in play of course: cable type, conduit type, distance, number of bends, and pulling lubricant used.

In short, be conservative with conduit fill for long runs of delicate small gauge multi-conductor cables like 22AWG TSP or CAT6A that could be damaged.   But for vertical cores between floors that are typically very short runs, you can probably fill to 80% without any significant risk, as long as the cable is properly supported and there is sufficient room remaining to properly apply intumescent firestop sealant.

Posted in: Access Control, Security Consulting

Leave a Comment (0) →

Playing Around with the PinPoint Survey Application using Amazon Data

We put together a quick demo of the PinPoint Survey Application using some public data scraped from the web for all the US Amazon sites.  The equipment names and photos are all generated, so don’t get too excited about thinking there are real Amazon security equipment details being posted on the web.

Some of the reporting features are turned off, but the overall objective was to show off the speed and utility of the site data and geospatial mapping capabilities for relating sites and equipment within those sites.

Using the application from a tablet, you can use the built-in GPS to map the device lat/lon data to the database, along with any photos, notes, and punch list information that might be relevant.  This is particularly useful for large external sites like ports, refineries, mines/quarries, or power generation/transmission facilities.

GIF Movie of PinPoint Survey Application using demonstration data for Amazon sites

PinPoint Survey Application Short Demo

Posted in: Access Control, Application Development, CPTED, Premises Liability, PSIM, Security Consulting, Security Technology, Vulnerability Analysis

Leave a Comment (0) →

HID Signo Readers Announced.

HID announced an entirely new reader line today, called Signo.  What’s immediately noticeable is they are more sleek and stylish than the iClass R or RP models, but looking further, we found that there are some distinct differences that might just make switching to this new reader platform sensible.

For starters, the keypad reader model looks more functional, and the mullion keypad reader is a definite necessity.  The keypads are capacitive  touch style which should make them more reliable in harsh environments.

Dimensions for the readers is almost identical, with the Signo readers being a little slimmer, but probably not by very much.  See Feature Comparison Matrix.

What’s missing though, like in the RP series, is a long range parking lot reader like the R90.  This is a needed technology that should be added in the future (are you listening, HID?).

The Signo series seems to lump all the reader technologies in together, making the product selection a little less confusing than previous iClass reader selections.  This is most welcomed.  Supported technologies are 125Khz proximity, iClass, SEOS, Mifare, plus mobile credentials via Bluetooth and NFC, plus Apple’s Enhanced Contactless Polling technology for apple wallet credentials.  

Other features are better support for crypto keys (no more base encryption key in the wild, for now), automatic tuning/detuning for optimized read range, and OSDP support out of the box.  Reader tamper is now a dry contact relay (THANK YOU).   But the biggest thing installers are going to enjoy is that the Signo readers support remote management.  No more configuration cards to go around to every reader just to turn of the 125Khz prox read feature set.  This should have been done LONG AGO.   Firmware updates, configuration, and reader management can be done via mobile device or over OSDP (assuming your PACS supports it).

From our take, these readers appear to have been developed largely for the Campus environment (the Apple ECP is a dead giveaway), but certainly have the feature sets that would make them desirable in the commercial, government, and industrial markets as well.  We don’t  have any evaluation copies yet, but will definitely be looking at these for new projects where they fit and offer additional security, style, and convenience.

Feature Comparison Matrix

Reader RP40 Signo 40
Dimensions 3.3″ x 4.8″ x 1.0″ 3.15″ x 4.78″ x 0.77″
Read Range (typ)

iCLASS: 2.4″

125Khz Prox: 2.8″ to 4.3″

iCLASS: 1.6″ to 4″

125Khz Prox: 2.4″ to 4″

Power 85ma @ 16VDC 75ma @ 12VDC
Comm Wiegand & (optional) OSDP  Wiegand & OSDP
Reader Tamper Open Collector Output Dry Contact Relay
Configuration Programming Cards Mobile Device or OSDP
Weatherproof If optional gasket installed Yes
Certifications UL294, EAL5+ UL294, EAL6+
Price ~$200.00 ~$200.00

 

 

Posted in: Access Control, Company News, Security Technology

Leave a Comment (0) →

Facial Recognition for Access Control?

Several years ago,  I worked on a project prototype for a major group of sea ports that had an interest to use the state’s drivers license image database for facial recognition/verification of TWIC applicants and the eventual use for identity verification for critical card access points.  The main focus of the project was to ensure that the person applying for the TWIC card was indeed who they claimed to be, and not an imposter.   Neither the CCTV system nor the card access system had the built in software to do this, much less do it together, so we had to write the interface and the software to manage it.  It worked, but not as well as we would have liked.   We used a GPL’d algorithm for the facial recognition, which while good, would have some false positives and false negatives from time to time.   Ultimately to me, it served as a proof of concept.  It did work, and could be made as a serviceable monitoring and investigation tool for security.  (Later we used that same GPL software to create a tool that would scrounge through the card access database and crop the cardholder photos to a uniform size.  THAT worked really well.)

Years later, as far as I know there is still not an off-the-shelf system that provides a true facial recognition monitoring capability for access control violations.  This seems like something very straightforward to do, and as most companies or government branches have an actively maintained photo database of their cardholder personnel, and most often have video cameras monitoring locations where access control is used.

The biggest limitation we found was the quality of the CCTV images against the badge database photos.   Both were of rather poor quality, but if we used the software as just a pre-filtering tool for security operators, the margins of error were more tolerable.  The idea was to still have a security guard doing the verification, but not for every photo, just the ones the software couldn’t handle well.

Cardholder with back to camera.

Poor camera angle doesn’t allow for good facial recognition

With Megapixel IP cameras replacing low resolution analog cameras, the probability improves of having a photo with an acceptable number of unique data points to match against an image database with a high degree of confidence.  This means more information data points to compare, and fewer false positives and negatives.   There are still other considerations such as angle of view, proper lensing, lighting, face concealment/alteration issues, and image database accuracy.  And you must have most, if not all of these considerations to have a usable image.  As shown here, even if you have good lighting and resolution, if you don’t have a good angle and lensing, you will not have a usable image for facial recognition of the cardholder.

Currently, there are about a dozen corporations world wide that offer some type of facial recognition software.   Many of their larger customers are government agencies or the financial industry.  It is used in some border crossings, passport identification, and high profile monuments.   The FBI may be the most famous consumer of this technology, but it is not used in a widespread fashion as far as I know.  Naturally, this isn’t something that is widely advertised by these agencies.

Still, as such a highly technically savvy country as the USA supposedly is, I’ve often wondered why we don’t have facial recognition with a national database at all critical locations like border crossings, airports, bus stations, train stations, embassies, and hospitals.  I realize there’s a modest invasion of privacy, and nobody likes the thought of having “big brother” monitor your whereabouts, especially putting your name to your face in a specific location and time.   It’s kind of creepy.  But the other side of the coin is that if we maintain a central photographic database of active criminals and terrorists (which we do), then having feeds from certain cameras in certain high traffic locations might allow us to not only apprehend said criminals/terrorists in a timely manner, but even allow us to gain intelligence regarding their commuting patterns, associations, and personal habits.  This is beneficial information that can reduce crime and terrorism.

Keep in mind, the government already has a very large database of photos, probably including you, even if you don’t have a mug shot in the NCIC.  Facebook, Twitter, Instagram, LinkedIn, are all repositories available that most likely link your face with your name.   The FBI has said that by 2015, it plans to have 52 million photos in its NGI facial recognition database.   The FBI will include non-criminal information as well as criminal.  Where’d they get those?!    So, you may already be in the database, and maybe me too.  Obviously, some people will object to this idea, some even quite profusely.  But the genie is already out of the bottle.  Getting him stuffed back in is going to be difficult, if not impossible.

So the natural progression on this “big brother” concern just may be to license the database.   For a fee, allow vetted customers to have access to the database via an API to use this centralized database for government and limited private commercial purposes.  Want to know if your daughter or son is in the NGI database?  Maybe there’s a background check service company that can tell you.   But for financial institutions, or the port authority I mentioned in the beginning of this article, it would be a boon of intelligence data.   Not only would they have their own employees and contractors in their own database, they could also have access to a national database of “persons of interest” that could assist them in determining if a potential applicant is a criminal, or maybe even just a high risk.  That has the simultaneous possibility of reducing their own risks, and providing timely information to Homeland Security about a potential threats whereabouts and possible intentions.

Facial recognition of employees at work

Facial recognition in the workplace.

I think the future of this technology is already headed in this direction, and there may already be entities that are doing exactly what I’ve described, but I believe the technology will become more pervasive as some of the technological (and sociological) barriers are broken down.

Posted in: Access Control, Company News, Security Technology

Leave a Comment (0) →

PINs Matter

scramblepad

Hirsch Scramblepad

When working with a client once, they asked us to help harden their biological research labs by recommending additional security measures they could install. We did an initial and very casual walkthrough with them of the labs and how they were used. They were particularly proud of the Hirsch Scramblepads they had installed for access controlled doors. For those unfamiliar with these, they are an ingenious type of PIN pad where the numbers change each time you begin to enter your PIN sequence. This way, someone cannot peek merely at where your fingers were and assume that if you were at the bottom right of the pad, it was a 9. Anyway, they were (and still are in some circles) the Cadillac of PIN pads for access control.

As we began interviewing some of the lab staff, we asked how well they liked the keypads and how they were used. Most responded that they felt the keypads worked very well and were kind of “Star Wars” like because of their technology. We soon learned however, that the PINs used were 4 digit pins, and that there were a couple of hundred people who had access to these labs. To make it worse, departmental policy was that the individual was allowed to select their own PIN.  Yikes.

So, I promptly walked up to a PIN pad, and entered “1234”.

“Click”.  The door opened.

Okay, “1379”.  “Click”.

Yep.  Hmmm, one more, “2468”.  “Click”.   Okay, I see the biggest problem…

The good news, is it was a cheap fix.  That doesn’t mean easy, it was just cheap.  The long term fix was to add card access with CARD+PIN readers to enhance security; but in the mean time, we just increased the number of digits in the PIN, and assigned the PINs to the staff instead of letting them pick their own.  That’s why it wasn’t easy.  Some of the staff complained because now they had to learn a new PIN, and sometimes they forgot it, locking themselves out of the lab until they could remember it or get it reset.   Memorizing a new number (don’t we have enough numbers, passwords, etc. to learn already?!) is not fun and shouldn’t be necessary just to get into work.

Reading this now, this all probably seems like common sense to you, and it is.  It’s just that sometimes common sense isn’t used in practical applications the way we would always expect.  Security is a hassle, an inconvenience.  So, someone decided to make it easier on people and let them pick their own PIN.   This is were Security Policy and Procedures come into play.  They should be developed, implemented, maintained, and tested.  Had a proper policy been conceived and applied to the issuance of access control PINs, our job wouldn’t have been so easy.

PINs Matter

Just like passwords, a weak PIN is worse than NO PIN at all, because it gives you a false sense of security when there really is none.  If you still use only PINs, pick unique PIN of at least 8 digits, and ensure that they are unique for each user.  But better still, couple a PIN with an additional level of access control such as card access or biometrics.  After all, two levels of security are always better than one.

 

 

Posted in: Access Control, Security Technology

Leave a Comment (0) →