building occupants and assets security

19
Security for Building Occupants and Assets by the WBDG Secure/Safe Committee Last updated: 09-26-2013 With in T hi s Page  Overview  Security Standards  Design Basis Threat Tactics   Related Issues  Relevant Codes and Standards  Major Resources OVERVIEW The 2001 terrorist attacks at New York City's World Trade Center and the Pentagon, the 1995 bombing of Oklahoma City's Alfred P. Murrah Federal Office Building, and the 1996 bombing at Atlanta's Centennial Park, and more recently the bombing at the Boston Marathon, shook the nation, and made Americans aware of the need for better ways to protect occupants, assets, and buildings from human aggressors (e.g. disgruntled employees, criminals, vandals, lone active shooter, and terrorists). The 2001 terrorist attacks demonstrated the country's vulnerability to a wider range of threats and heightened public concern for the safety of workers and occupants in all Building Types. Many federal agencies responding to these concerns have adopted an overarching philosophy to provide appropriate and cost-effective protection for buil ding occupants. Security measures, such as setbacks, bollards, protective glazing, and structural hardening, are incorporated into the design of the new Oklahoma City Federal Building, located north of where the former Alfred P . Murrah Federal Building once stood. (Designed by Ross Barney + Jankowski Architects and Atkins Benham) The basic components of the physical security measures to address an  explosive threatconsiders the establishment of a  protected perimeter , the prevention of   progressive collapse, the design of a debris mitigating façade, the isolation of internal explosive threats that may evade detection through the screening stations or may enter the public spaces prior to screening and the protection of the emergency evacuation, rescue and recovery systems. Other than establishing a protected

Upload: gabboband

Post on 16-Oct-2015

34 views

Category:

Documents


0 download

TRANSCRIPT

Security for Building Occupants and Assetsby the WBDG Secure/Safe CommitteeLast updated: 09-26-2013Within This Page Overview Security Standards Design Basis Threat Tactics Related Issues Relevant Codes and Standards Major ResourcesOVERVIEWThe 2001 terrorist attacks at New York City's World Trade Center and the Pentagon, the 1995 bombing of Oklahoma City's Alfred P. Murrah Federal Office Building, and the 1996 bombing at Atlanta's Centennial Park, and more recently the bombing at the Boston Marathon, shook the nation, and made Americans aware of the need for better ways to protect occupants, assets, and buildings from human aggressors (e.g. disgruntled employees, criminals, vandals, lone active shooter, and terrorists). The 2001 terrorist attacks demonstrated the country's vulnerability to a wider range of threats and heightened public concern for the safety of workers and occupants in allBuilding Types. Many federal agencies responding to these concerns have adopted an overarching philosophy to provide appropriate and cost-effective protection for building occupants.

Security measures, such as setbacks, bollards, protective glazing, and structural hardening, are incorporated into the design of the new Oklahoma City Federal Building, located north of where the former Alfred P. Murrah Federal Building once stood.(Designed by Ross Barney + Jankowski Architects and Atkins Benham)The basic components of the physical security measures to address anexplosive threatconsiders the establishment of aprotected perimeter, the prevention ofprogressive collapse, the design of adebris mitigating faade, the isolation of internal explosive threats that may evade detection through the screening stations or may enter the public spaces prior to screening and the protection of the emergency evacuation, rescue and recovery systems. Other than establishing a protected perimeter, theseprotective measuresare generally achieved through principles of structural dynamics, nonlinear material response, and ductile detailing. Operational security and life safety measures should be considered together with the physical security measures to develop a comprehensive building security design.Effective implementation of the physical security measures will require the involvement of blast engineers and security consultants at the onset of the programming phase. Early and ongoing coordination between the blast engineer, the structural engineer, and the entire design team is critical to providing an optimal design that is both open and inviting to the public and compliant with the security requirements.BACK TO TOPSECURITY STANDARDSIn addition to theFEMA risk reduction publicationsthat provide background information for performing risk assessments and guidance for protective design approaches, different branches of the federal government developed design criteria for the protection of federal facilities. The most prominent of these agency design criteria are the Interagency Security Committee (ISC) physical security criteria, the Department of Defense Protective Design Center (DOD-PDC), the Veterans Administration (VA), and the Department of State (DOS). Each of these government agencies considers the effects of terrorist explosive events on their facilities and the protection of their occupants. An overview of each of these agency design criteria is provided below.In addition to the FEMA risk reduction publications that provide background information for performing risk assessments and guidance for protective design approaches, different branches of the federal government developed design criteria for the protection of federal facilities. The most prominent of these agency design criteria are the Interagency Security Committee (ISC) physical security criteria, the Department of Defense Protective Design Center (DOD-PDC), the Veterans Administration (VA), and the Department of State (DOS). Each of these government agencies considers the effects of terrorist explosive events on their facilities and the protection of their occupants. An overview of each of these agency design criteria is provided below.Interagency Security Committee (ISC)Membership in the ISC consists of over 129 senior level executives from 51 federal agencies and departments. In accordance with Executive Order 12977, modified by Executive Order 13286, the ISC's primary members represent 21 federal agencies and is chaired by the Department of Homeland Security (DHS). The ISC criteria underwent a major revision in April of 2010 and had minor amendments in July 2011.The most recent revision of the ISC guidance compendium is a risk-based approach that is composed of: Facility Security Level Determinations for Federal Facilities (21 February 2008) Physical Security Criteria for Federal Facilities (12 April 2010) Addendum Physical Security Criteria for Federal Facilities 2010, July 2011 The Design-Basis Threat (routine updates, March 2013, 7th edition) The Use of Physical Security Performance Measures (June 2009) Facility Security Committees (January 2012, 2nd edition) Interagency Security Committee Standards, Best Practices and Training CoursesNote: All of these documents are For Official Use Only (FOUO) and will only be distributed outside the Government on a need-to-know basis.The Facility Security Level document provides the procedure for determining the Facility Security Level (FSL) based on the characteristics of the facility and the occupancies they house. Five factors (mission criticality, symbolism, facility population, facility size, and threat to tenant agencies) are quantified to determine the FSL. The FSL is determined by the Facility Security Committee (FSC), which consists of representatives of all Federal tenants in the facility, the security organization, and the owning or leasing department or agency. Once the FSL is established, the Design Basis Threat document provides the Design Basis Threat Scenario, Baseline Threat, Analytical Basis, Target Attractiveness and Outlook for twenty-nine "undesirable events" that range from Aircraft as a Weapon to Workplace Violence. This all-hazards approach provides a comprehensive review of the potential acts of violence the facility faces and provides guidance to assess the risk. The Physical Security Criteria (PSC) document provides the overall basis for the threat and risk assessment. The Facility Security Committee is responsible for addressing the facility specific security issues and approving the implementation of security measures and practices. The implementation may be a combination of operational and physical security measures based on the FSL and the Level of Protection (LOP) that is deemed both appropriate and achievable. To facilitate the process, the document tabulates the requirements for all the individual security criteria categories relative to the desired LOP. The security criteria categories are further correlated to additional Appendix information and to the specific undesirable events that the protective measures are intended to address. This presentation of the protective design criteria helps illustrate the all-hazard risk based approach.General Services Administration (GSA)The ISC PSC is risk based and open to the interpretation of the protective design consultant. To establish a consistent application of the ISC PSC across the building portfolio, the General Services Administration (GSA) has developed the "General Services Administration Facility Security Requirements for Explosive Devices Applicable to Facility Security Levels III and IV, GSA's Interpretation of the Interagency Security Committee (ISC) Physical Security Criteria" (2 August 2011) (SBU). This document provides specific facility security requirements for explosive devices for Facility Security Levels (FSL) III and IV. The guidance includes the calculation of blast loads, material strength factors, flexure and shear response criteria, glazed system response criteria, faade performance, structure performance and progressive collapse resistance.Department of Defense (DoD)The DoD utilizes Unified Facility Criteria (UFC) to establish their facility construction requirements. The two overarching security engineering UFCs are UFC 4-020-01DoD Security Engineering Planning Manualand UFC 4-010-01DoD Minimum Antiterrorism Standards for Buildings. TheDoD Security Engineering Planning Manualis the starting point and, based on the risk to and value of the asset, drives the application of theDoD Minimum Antiterrorism Standards for Buildingsand any additional protective construction over and above the minimum standards. The planning manual implements a risk based model that ranks 14 rating factors to determine the level of protection required for each of 13 aggressors (threats). Those rating factors include asset value, asset replaceable, military impact of loss, political sensitivity, related value, location, public profile, accessibility, availability, mobility of asset, recognizable value to aggressor, law enforcement presence, perceived success, threat level, local history, terrorist capability, terrorist environment, and terrorist activity. All these factors are scored to determine the level of protection. Regardless of the risk and value of the asset, DoD has directed that all occupied facilities must receive a baseline level of protection for its employees, contractors and dependents in order to protect against mass casualties. Therefore assets that score less than 0.5 in asset value or threat likelihood must only comply with the baseline protective requirements in the UFC 4-010-01DoD Minimum Antiterrorism Standards for Buildings. These two UFCs and other supporting security engineering UFCs can be found on the Whole Building Design Guideweb page.Recent DEPSECDEF issued new direction for the security of off installation leased facilities. Effective 7 Dec. 2012 off installation leased facilities for DoD must follow the Interagency Security Committee (ISC) Physical Security Criteria for Federal Facilities. This change is intended to reduce the cost of leased facilities, eliminate relocation cost, align with other federal agency security requirements and make it easier to obtain commercial leased space.Department of Veterans Affairs (VA)VA conducted assessments of representative facilities and campuses in both urban and rural areas and identified the vulnerabilities that are common to most facilities. Based on the findings of these assessments, VA developed the Physical Security Design Manuals (PSDM) forMission Critical (MC) Facilitiesand forLife-Safety Protected (LSP) Facilities. These documents outline the most practical and cost effective protective measures that address both natural and man-made hazards to which occupants may be exposed. The Design Manuals address site conditions, building entrances and exits, functional areas, building envelope, building structure, utilities and building services, building systems, and security systems.Department of State (DoS)The Department of State (DoS) security criteria for their international facilities are documented in the 2013 Overseas Building Organization (OBO) Design Standards (SBU). The approach of the DOS requirements is to enforce both an anti-ram and anti-personnel standoff distance, provide a debris mitigating and forced entry ballistic resistant (FEBR) faade; provide a regular moment resisting frame that is inherently resistant to progressive collapse and to design the structure to resist the blast induced base shears. Both the magnitudes of the design basis threats (DBT) and the performance criteria for the DoS buildings are generally much more arduous than the corresponding requirements imposed by other government agencies.Guidance for Commercial BuildingsAlthough there are numerous government security criteria standards, there are no comparable documents for commercial buildings. The American Society of Civil Engineers (ASCE) therefore undertook the task to develop a consensus based Blast Standard that identifies the minimum planning, design, construction, and assessment requirements for new and existing buildings subject to the effects of accidental or malicious explosions, including principles for establishing appropriate threat parameters, levels of protection, loadings, analysis methodologies, materials, detailing, and test procedures. The document does not prescribe requirements or guidelines for the mitigation of progressive collapse or other potential post-blast behavior. Unlike the government standards, the ASCE Standards are written for structural engineers with specific information pertaining to the design and detailing of blast resistant structures and faade systems.Crime Prevention Through Environmental Design (CPTE)Crime Prevention Through Environmental Design (CPTED)(PDF 867 KB)is a proven methodology that not only enhances the performance of these security and safety measures, but also provides aesthetics and value engineering. CPTED utilizes four (4) primary, overlapping principles: Natural Surveillance, Natural Access Control, Territoriality, and Maintenance. Natural surveillance follows the premise that criminals do not wish to be observed; placing legitimate 'eyes' on the street, such as providing window views and lighting, increases the perceived risk to offenders, reduces fear for bona fide occupants and visitors, as well as lessening reliance on only camera surveillance. Natural Access Control supplements physical security and operational measures with walls, fences, ravines, or even hedges to define site boundaries, to channel legitimate occupants and visitors to designated entrances, and to reduce access points and escape routes. Territoriality involves strategies to project a sense of ownership to spaces such that it becomes easier to identify intruders because they don't seem to belong. Clear differentiation between public, semi-public, and private spaces by using signage, fences, pavement treatment, art, and flowers are examples of ways to express ownership. Maintenance is a key element to preserve lines of sights for surveillance, to retain the defensiveness of physical elements, and to project a sense of care and ownership. Together, the principles of CPTED increase the effectiveness of operational, technical, and physical safety methods, thereby lessening equipment and operating costs.For total design efficiency and cost effectiveness, security, safety, and CPTED measures are best applied at the beginning of a project. Security programming is a useful practice to identify security design requirements necessary to satisfy stakeholder concerns.Application of Standards to BuildingsAs is evident in the overview of the different existing standards above, there are currently no universal codes or standards that apply to all public and private sector buildings. However, most designers agree that security issues must be addressed in usingintegrated design processwith an understanding of the impacts and goals of otherdesign objectives. This will ensure a quality building with effective security.BACK TO TOPDESIGN BASIS THREAT TACTICSDepending on the building type, acceptable levels of risk, and decisions made based on recommendations from a comprehensivethreat assessment, vulnerability assessment, and risk analysis, appropriate countermeasures should be implemented to protect people, assets, and mission.Some types of attack and threats to consider include: Unauthorized entry/trespass (forced and covert) Insider threats Explosive threats: Stationary and moving vehicle-delivered, mail bombs, package bombs Ballistic threats: Small arms, high-powered rifles, drive-by shootings, etc. Weapons of mass destruction (chemical, biological, and radiological) Disruptive threats (hoaxes, false reports, malicious attempts to disrupt operations) Cyber and information security threats Supervisory Control and Acquisition Data (SCADA) system threats (relevant as they relate to HVAC, mechanical/electrical systems control and other utility systems that are required to operate many functions within building)Unauthorized Entry (Forced and Covert)Protecting the facility and assets from unauthorized persons is an important part of any security system. Some items to consider include: Compound or facility access control Control perimeter: Fences, bollards, anti-ram barriers Traffic control, remote controlled gates, anti-ram hydraulic drop arms, hydraulic barriers, parking control systems Forced-Entry-Ballistic Resistant (FE-BR) doors, windows, walls and roofs Barrier protection for man-passable openings (greater than 96 square inches) such as air vents, utility openings and culverts Mechanical locking systems Elimination of hiding places Multiple layer protection processes Perimeter intrusion detection systems Clear zone Video and CCTV surveillance technology Alarms Detection devices (motion, acoustic, infrared) Personnel identification systems Access control, fingerprints, biometrics, ID cards Credential management Tailgating policies Primary and secondary credential systems Protection of information and data Acoustic shielding Shielding of electronic security devices from hostile electronic environments Computer screen shields Secure access to equipment, networks, and hardware, e.g. satellites and telephone systemsInsider ThreatsOne of the most serious threats may come from persons who have authorized access to a facility. These may include disgruntled employees or persons who have gained access through normal means (e.g., contractors, support personnel, etc). To mitigate this threat some items to consider include: Implement personnel reliability programs and background checks Limit and control access to sensitive areas of the facility Compartmentalization within the building/campus Two-man rule for access to restricted areasExplosive Threats: Stationary and Moving Vehicle-Delivered, Mail Bombs, Package BombsExplosive threats tend to be the terrorist weapon of choice. Devices may include large amounts of explosives that require delivery by a vehicle. However, smaller amounts may be introduced into a facility through mail, packages, or simply hand carried in an unsecured area. Normally the best defense is to provide defended distance between the threat location and the asset to be protected. This is typically called standoff distance. If standoff is not available or is insufficient to prevent direct contact or reduce the blast forces reaching the protected asset, structural hardening may be required. If introduced early in the design process, this may be done in an efficient and cost-effective manner. If introduced late in a design, or if retrofitting an existing facility, such a measure may prove to be economically difficult to justify. Some items to consider include: Including qualified security and blast consulting professionals from programming forward. Providing defended standoff for vehicle-borne weapons using rated or certified barriers such as anti-ram fencing or bollards, by using reinforced street furniture such as planters, plinth walls or lighting standards, by using natural and man-made elements such as storm water elements, berms, ditches, tree masses, etc., by site layout strategies for parking areas, roadways, loading docks and other locations accessible by vehicles, by critical asset location strategies, and/or by security protocol through policy and procedures (e.g. vehicle inspections, etc.). Consider structural hardening and hazard mitigation designs such as ductile framing that is capable of withstanding abnormal loads and preventing progressive collapse, protective glazing, strengthening of walls, roofs, and other facility components. Provide redundancy and physical separation of critical infrastructure (HVAC), utility systems (water, electricity, fuel, communications and ventilation). Provide for refuge and evacuation. Consider plans for suicide bombers. Confer with authorities who have had previous experience. Provide defended standoff for hand-carried weapons with anti-climb fencing, barrier (thorny) plants, natural surveillance of routine occupants and unobstructed spaces, electronic surveillance, intrusion detection, territoriality using defined spaces, natural access control suing exterior and interior pedestrian layout strategies, security protocol through policy and procedures (visitor management, personnel and package screening, etc.). Consider handling mail at alternate or remote locations not attached to the building or in a wing of the building with a dedicated HVAC system to limit contamination and damage to the main building. Consider loading docks in structures unattached to the main building with a dedicated HVAC system to limit contamination and damage to the main building.Ballistic ThreatsThese threats may range from random drive-by shootings to high-powered rifle attacks directed at specific targets within the facility (assassinations). It is important to quantify the potential risk and to establish the appropriate level of protection. The most common ballistic protection rating systems include:Underwriters Laboratories (UL),National Institute of Justice (NIJ),H.P. White Laboratory, andASTM International. Materials are rated based on their ability to stop specific ammunition (e.g., projectile size and velocity). Some items to consider include: Obscuration or concealment screening using trees and hedges, berms, solid fencing, walls, and less critical buildings Ballistic resistant rated materials and products Locating critical assets away from direct lines of sight through windows and doors Minimize number and size of windows Physical energy absorption screens such as solid fences, walls, earthen parapets Provide opaque windows or window treatments such as reflective coatings, shades or drapes to decrease sight lines. Avoid sight lines to assets through vents, skylights, or other building openings Use foyers or other door shielding techniques to block observation through a doorway from an outside location. Avoid main entrances to buildings or critical assets that face the perimeter or an uncontrolled vantage pointWeapons of Mass Destruction: Chemical, Biological, and Radiological (CBR)Commonly referred to as WMD, these threats generally have a low probability of occurrence but the consequences of an attack may be severe. These threats may be delivered by hand, mail, or as a result of accidental release of toxic industrial agents. While fully protecting a facility against such threats may not be feasible with few exceptions, there are several common sense and low cost measures that can improve resistance and reduce the risks. Some items to consider include: Protect ventilation pathways into the building Control access to air inlets and water systems Locate air intake well above ground level Provide detection and filtration systems for HVAC systems, air intakes and water systems Provide for emergency HVAC shutoff and control Segregate portions of building spaces (i.e., provide separate HVAC for the lobby, loading docks, and the core of the building) Consider positive pressurization to keep contaminates outside of the facility Provide an emergency notification system to facilitate orderly response and evacuation Avoid building locations in depressions where air could stagnate Provide access control to mechanical rooms Provide CBR monitoring apparatusCyber and Information Security ThreatsBusinesses rely heavily on the transmission, storage, and access to a wide range of electronic data and communication systems. Protecting these systems from attack is critical. Some items to consider include: Understand and identify the information assets you are trying to protect. These may include personal information, business information such as proprietary designs or processes, national security information, or simply the ability of your organization to communicate via email and other LAN/WAN and wireless functions. Protect the physical infrastructure that supports information systems. If the computer system is electronically secure but vulnerable to physical destruction it may need more protection. Provide software and hardware devices to detect, monitor, and prevent unauthorized access to or the destruction of sensitive information.BACK TO TOPRELATED ISSUESBuilding Design to Mitigate the Potential for a Progressive CollapseProgressive collapse is loosely defined as a situation where a localized failure of a primary structural element leads to the collapse of adjacent structural elements, which propagates to disproportionate collapse of the structure. ASCE 7 states "Progressive collapse is defined as the spread of an initial local failure from element to element, eventually resulting in the collapse of an entire structure or disproportionately large part of it." The initial failure or damage could be from a number of different causes, which might include natural or man-made hazards. The phenomenon is applicable to structure of any appreciable size and type of construction. Concern is greatest for taller structures, as the propagation mechanism is typically vertical.Design guidelines for the prevention of progressive collapse typically take a threat-independent approach that, regardless of initial cause, is intended to develop inherent robustness and continuity in the structure to resist and arrest propagation of failure. For example, design of a structural frame to resist propagation of damage after loss of a primary vertical-load-carrying element (such as a load-bearing wall or column) is a typical threat-independent approach to providing this resistance. This approach assumes complete damage of the structural element being considered and enhances the structure to prevent disproportionate spread of damage. By assuming loss of single vertical-load-carrying elements at key locations in the structure, the designer can reduce the potential for progressive collapse, should an initiating event occur. Design approaches and requirements are presented by the Department of Defense (UFC 4-023-03 Design of Buildings to Resist Progressive Collapse) and the General Services Administration (Progressive Collapse Analysis and Design Guidelines for New Federal Office Buildings and Major Modernization Projects). Each of these guidelines provides methods for analysis and measures of acceptability to meet each specific criterion. These Progressive Collapse guidelines (GSA and UFC) are currently the most complete sets of criteria in terms of providing usable guidance to the designer.For buildings that are designed to incorporate physical security hardening measures to protect occupants against explosive or other intentional threats, progressive collapse mitigation measures are typically also applied and work in concert with the hardening measures to achieve the necessary protection of the building occupants and assets. Although the physical hardening measures include design features that protect against the specific identified threats, the progressive collapse mitigation measures provide a level of redundancy and continuity that will enhance the building performance, regardless of the actual threat size or weapon. When considered in the selection and design of the building structural system, progressive collapse design methodologies often lead to the utilization of inherently redundant and ductile systems, which are capable of more easily achieving the performance requirements. Additional discussion of the role of Progressive Collapse mitigation measures in securing buildings can be found in the resource pages forBlast Safety of the Building EnvelopeandDesigning Buildings to Resist Explosive Threats.Crash Rated Barriers and Applicable StandardsA successfulsite securityplan often involves the establishment and enforcement of a controlled perimeter. The controlled perimeter may act to prevent threats that are transported by vehicles or by pedestrians from entering a standoff zone around a protected facility. A controlled perimeter that is designed to stop a vehicle from entering a protected site is often required to be "crash" or "anti-ram" rated. A crash rated barrier system is typically tested or engineered such that it can stop a certain size vehicle (i.e. 4,000 lbs.,15,000 lbs.), travelling at a certain speed (i.e., 30 mph) from penetrating the controlled perimeter more than a certain distance (i.e., 3 ft.). The vehicle size, vehicle speed and penetration distance are typically determined based on the accessibility of the site, the topography and alignment of the surrounding roadways and the required standoff distance. Crash rated barriers take various forms and can include bollards, cable reinforced fences and planters. Where vehicle access is required into the secure site for parking, maintenance, emergencies or deliveries, active vehicle barriers may be employed; these can include plate barriers, wedge barriers, retractable bollards or gates. For more discussion regarding crash rated barrier assemblies, seeUFC 4-022-02"Selection and Application of Vehicle Barriers," and theBollardresource page.The governing crash testing standard used for evaluating barrier systems is ASTM F 2656-07, "Standard Test Method for Vehicle Crash Testing of Perimeter Barriers." This standard replaced the DoS Diplomatic Security standard SD-STD-02.01, Revision A. ASTM F 2656 includes "Impact Condition Designations" or "Crash Ratings" for various test vehicles (ex. small passenger cars, pick-up trucks, medium-duty trucks and heavy goods vehicles) traveling from 40-60 mph. An example impact condition designation is a H50 which designates a "heavy goods vehicle" traveling at 50 mph. Similar C-, PU-, and M-ratings are provided for the other test vehicle types.Integrating Security and Historic PreservationBalancing the site, faade, structural, and operational requirements of a building required to comply with security standards with historic preservation goals and standards can be particularly challenging. Careful planning and an understanding ofhistoric preservationobjectives is necessary in order to address the requirements of both. A discussion of retrofit methods that have been successfully employed to meet security requirements in existing buildings are provided in theRetrofitting Existing Buildings to Resist Explosive Threatsresource page. Specific challenges that may be encountered in applying these retrofit methodologies to historic buildings include lack of documentation on the existing construction, differing building technology at the time of construction, low inherent strength and ductility of existing systems, and limitations on modifications that can be made due to historic preservation restrictions.Integrating Security and SustainabilityProviding for sustainable design that meets all facility requirements is often a challenge. With limited resources, it is not always feasible to provide for the most secure facility, architecturally expressive design, or energy efficient building envelope. From the planning and concept stages through the development of construction documents, it is important that all project or design stakeholders work cooperatively to ensure a balanced design. Successful designs must consider all competing design objectives and make the best selections. This applies as well to the site, as well as the building. Ensure sustainablesite designand CPTED are considered in concert with each other.Integrating Security and Fire ProtectionCare should be taken to implement physical security measures that allow Fire Protection forces access to sites, buildings and building occupants with adequate means of emergency egress. GSA has conducted a study and developed recommendations on design strategies that achieve both secure and fire safe designs. Specifically, the issue of emergency ingress and egress through blast resistant window systems was studied. Training was developed based on this information and is available at theGSA Firefighter forcible entry tutorial.

Integrated security systems can offer more efficient access and control.(Courtesy of Integrated Security Systems, LTD)Integrated Security SystemsThere has been a general trend towards integrating various stand-alone security systems, integrating systems across remote locations, and integrating security systems with other systems such as communications, and fire and emergency management. Some CCTV, fire, mass notification systems, and burglar alarm systems have been integrated to form the foundation for access control. The emerging trend is to integrate security systems with facility and personnel operational procedures. By involving facility stakeholders from the programming stage throughout the life of the project, the behavioral-based policies can be successfully integrated with security systems and forces.Blast Design vs. Seismic DesignSeismic and blast resistant design share some common analytical methodologies and a performance based design philosophy that accepts varying levels of damage in response to varying levels of dynamic excitation. Both design approaches recognize that it is cost prohibitive to provide comprehensive protection against all conceivable events and an appropriate level of protection that lessens the risk of mass casualties can be provided at a reasonable cost. Both seismic design and blast resistant design approaches benefit from a risk assessment that evaluates the functionality, criticality, occupancy, site conditions and design features of a building.While there may be more predictability with natural hazards, this is not the case with man-made hazards. Also the explosive threats of the future are very likely to be very different from the explosive threats of the past. Another fundamental difference between seismic and blast events are the acceptable design limits. Since earthquakes are more predictable and affect more structures than are affected by blast events, owners may be willing to accept different levels of risk relative to these different events, and this may translate into differences in acceptable design limits, as defined by allowable deformation, ductility and other functions.Both seismic design and blast resistant design approaches consider the time-varying nature of the loading function. The response of a building to earthquake loads is global in nature, with the base motions typically applied uniformly over the foundations of the buildings. These seismic motions induce forces that are proportional to the building mass. Blast loading is not uniformly applied to all portions of the building. Parts of the structure and components closest to and facing the point of detonation will experience higher loading than components at a greater distance and/or not facing the point of detonation. The structure's mass also contributes to its inertial resistance. Due to the local versus global nature of blast loading, seismic loading analogies, including the concept of blast-induced base shears, must be applied with great care or they may be misconstrued to provide a false sense of protection.Building configuration characteristics, such as size, shape and location of structural elements, are important issues for both seismic and blast resistant design. The manner in which forces are distributed throughout the building is strongly affected by its configuration. While seismic forces are proportional to the mass of the building and increase the demand, inertial resistance plays a significant role in the design of structures to reduce the response to blast loading. Structures that are designed to resist seismic forces benefit from low height-to-base ratios, balanced resistance, symmetrical plans, uniform sections and elevations, the placement of shear walls and lateral bracing to maximize torsional resistance, short spans, direct load paths and uniform floor heights.While blast resistant structures share many of these same attributes, the reasons for doing so may differ. For example, seismic excitations may induce torsional response modes in structures with re-entrant corners. These conditions provide pockets where blast pressures may reflect off of adjacent walls and amplify the blast effects. Similarly, first floor arcades that produce overhangs or reentrant corners create localized concentrations of blast pressure and expose areas of the floor slab that may be uplifted. In seismic design, adjacent structures may suffer from the effects of pounding in which the two buildings may hit one another as they respond to the base motions. Adjacent structures in dense urban environments may be vulnerable to amplification of blast effects due to the multiple reflections of blast waves as they propagate from the source of the detonation. While the geology of the site has a significant influence on the seismic motions that load the structure, the surrounding geology of the site will influence the size of the blast crater and the reflectivity of the blast waves off the ground surface.On an element level, the plastic deformation demands for both seismically loaded structures and blast-loaded structures require attention to details. Many similar detailing approaches can be used to achieve the ductile performance of structural elements when subjected to both blast and seismic loading phenomenon. Concrete columns require lateral reinforcement to provide confinement to the core and prevent premature buckling of the rebar. Closely spaced ties and spiral reinforcement are particularly effective in increasing the ductility of a concrete compression element. Carbon fiber wraps and steel jacket retrofits provide comparable confinement to existing structures. Steel column splices must be located away from regions of plastic hinging or must be detailed to develop the full moment capacity of the section. Local flange buckling must be avoided by using closely spaced stiffeners or, in the case of blast resistant design, the concrete encasement of the steel section.Reinforced concrete beam sections require resistance to positive and negative bending moments. In addition to the effects of load reversals and rebound, doubly reinforced sections possess greater ductility than singly reinforced counterparts. Steel beams may be constructed composite with the concrete deck in order to increase the ultimate capacity of the section; however, this increase is not equally effective for both positive and negative moments. While the composite slab may brace the top flange of the steel section, the bottom flange is vulnerable to buckling.Addressing blast and seismic design goals may be achieved through the consideration of many of the same building attributes and utilizing similar design and detailing solutions. An understanding of the differences between these two loading phenomenon, the effects on the structure, and the performance requirements are essential in order to select and implement the appropriate choices for achieving the project's goals. See theDesigning Buildings to Resist Explosive Threatspage for additional discussion on this topic.BACK TO TOPRELEVANT CODES AND STANDARDSHighly complex security system design is still neither codified nor regulated, and no universal codes or standards apply to all public and private sector buildings. However, in many cases, government agencies, including the military services, and private sector organizations have developed specific security design criteria. These standards must be flexible and change in response to emerging threats.Mandates Executive Orders Executive Order 12977, Interagency Security Committee, October 19, 1995 Executive Order 13286, Amendment of Executive Orders, and Other Actions, in Connection With the Transfer of Certain Functions to the Secretary of Homeland Security, February 28, 2003 Executive Order 13514 Federal Leadership in Environmental, Energy, and Economic Performance, October 5, 2009 Interagency Security Committee (ISC) web site Delegations Department of Homeland Security, Delegation Number: 7035.1, 02/01/2005, "Delegation of the Chair of the Interagency Security Committee to the Chief Security Officer"(PDF 75 KB) Department of Homeland Security, Delegation Number: 7035.2, 08/15/2007, "Delegation of the Chair of the Interagency Security Committee to the Assistant Secretary of Infrastructure Protection"(PDF 35 KB) Homeland Security Presidential Directives Homeland Security Presidential Directive 7, Critical Infrastructure Identification, Prioritization, and Protection, December 17, 2003 Homeland Security Presidential Directive 12, Policy for a Common Identification Standard for Federal Employees and Contractors, August 27, 2004 Homeland Security Presidential Directive 20, National Continuity Policy, May 4, 2007Federal Standards and Guidelines Department of Defense FM 3-19.30 Physical SecuritySets forth guidance for all personnel responsible for physical security MIL-HDBK-1013/1A Design Guidelines for Physical Security of Facilities PDC TR-10-01, Conventional Construction Standoff Distances of the Low and Very Low Levels of Protection IAW UFC 4-010-01 PDC TR-10-02, Blast Resistant Design Methodologies for Window Systems Designed Statically and Dynamically UFC 1-200-01 Design: General Building Requirements UFC 3-410-02 Lonworks Direct Digital Control for HVAC and Other Local Building Systems UFC 3-520-01 Design: Interior Electrical Systems UFC 3-530-01 Design: Interior and Exterior Lighting and Controls UFC 3-580-01 Telecommunications Building Cabling Systems Planning and Design UFC 3-470-01 Lonworks Utility Monitoring and Control System (UMCS) UFC 4-010-01 DoD Minimum Anti-Terrorism Standards for Buildings UFC 4-010-02 DoD Minimum Standoff Distances for Buildings (FOUO) UFC 4-010-05 Sensitive Compartmented Information Facilities Planning, Design, and Construction UFC 4-020-01 DoD Security Engineering Facilities Planning Manual UFC 4-020-02FA Security Engineering: Concept Design (FOUO) UFC 4-020-03FA Security Engineering: Final Design (FOUO) UFC 4-021-01 Design and O&M: Mass Notification Systems UFC 4-021-02 Electronic Security Systems UFC 4-022-01 Security Engineering: Entry Control Facilities / Access Control Points UFC 4-022-02 Selection and Application of Vehicle Barriers, with Change 1 UFC 4-023-03 Design of Buildings to Resist Progressive Collapse UFC 4-023-07 Design to Resist Direct Fire Weapons Effects UFC 4-024-01 Security Engineering: Procedures for Designing Airborne Chemical, Biological, and Radiological Protection for Buildings General Services Administration (GSA) Facilities Standards for the Public Buildings Service, P100, Chapter 8 Other "official use only" documents may be obtained from the Office of the Chief Architect GSA Progressive Collapse Guidelines GSA Occupant Emergency Program Guide(PDF 1 MB) Department of Veterans Affairs (VA) Physical Security Design Manual for VA Facilities: Mission Critical Facilities Physical Security Design Manual for VA Facilities: Life-Safety Protected Department of Homeland Security BIPS 01 Aging Infrastructure: Issues, Research, and Technology BIPS 02 Integrated Rapid Visual Screening of Mass Transit Stations BIPS 03 Integrated Rapid Visual Screening of Tunnels BIPS 04 Integrated Rapid Visual Screening of Buildings BIPS 05 Preventing Structures from Collapsing BIPS 06 / FEMA 426 Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings BIPS 07 / FEMA 428 Primer to Design Safe School Projects in Case of Terrorist Attacks and School Shootings BIPS 08 Field Guide for Building Stabilization and Shoring Techniques BIPS 09 Blast Load Effects in Urban Canyons: A New York City Study (FOUO) BIPS 10 High Performance Based Design for the Building Enclosure Chemical Facility Anti-terrorism Standards(PDF 781 KB) Colleges and Universities and the Chemical Facility Anti-Terrorism Standards (CFATS)(PDF 161 KB) Colleges and Universities and the Chemical Facility Anti-Terrorism Standards (CFATS) Fact Sheet(PDF 64 KB) NIPP Monuments and Icons Sector Specific Plan NIPP Risk Management Government Sector Specific Plan The Role of Emergency Responders in the Chemical Facility Anti-Terrorism Standards(PDF 267 KB) Cyber Security Evaluation Tool (CSET) User Guide, Version 4.1, January 2012 Active Shooter - How to Respond(PDF 4.15 MB) Active Shooter Pocket Card(PDF 228 KB) Committee on National Security Systems CNSSI No. 1253Security Categorization and Control Selection for National Security Systems, Version 2(PDF 1.4 MB), March 2012 Security Control Overlays Template, Version 1(PDF 95 KB), March 2012 Department of State Architectural Engineering Design Guideline (5 Volumes)(For Official Use Only) Physical Security Standards Handbook, 07 January 1998 (For Official Use Only) Structural Engineering Guidelines for New Embassy Office Buildings, August 1995 (For Official Use Only) Federal Aviation Administration (FAA) FAA Order 1600.69 Security Risk Management Federal Emergency Management Agency (FEMA) FEMA P-361 Design and Construction Guidance for Community Safe Rooms FEMA 386 Series on Mitigation Planning FEMA 386-7 Integrating Manmade Hazards into Mitigation Planning FEMA 424 Design Guide for Improving School Safety in Earthquakes, Floods and High Winds FEMA 427 Primer for Design of Commercial Buildings to Mitigate Terrorist Attacks FEMA 429 Insurance, Finance, and Regulation Primer for Terrorism Risk Management in Buildings FEMA 430 Site and Urban Design for Security FEMA 452 Risk Assessment - A How-To Guide to Mitigate Potential Terrorist Attacks Against Buildings FEMA 453 Design Guidance for Shelters and Safe Rooms FEMA 543 Design Guide for Improving Critical Facility Safety from Flooding and High Winds FEMA P-750 NEHRP Recommended Seismic Provisions Interagency Security Committee (ISC) Design Basis Threat Report, April 2012 National Institute of Standards and Technology (NIST) NIST Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations - Information Security, Revision 4(PDF 3.17 MB), February 2012 NIST Special Publication 800-82 Guide to Industrial Control Systems (ICS) Security(PDF 1.9 MB), June 2011 Draft NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0(PDF 7.26 MB), February 2012Others Department of Commerce Administrative Orders Inspector General Investigations, DAO 207-10 Occasional Use of Public Areas in Public Buildings, DAO 206-5 Security Programs, DAO 207-1 Designing for Security in the Nation's Capitalby the National Capital Planning Commission (NVPC). October 2001 Guidance for Protecting Building Environments from Airborne Chemical, Biological, or Radiological Attacksby the National Institute for Occupational Safety and Health (NIOSH) NISTIR 7628 Guidelines for Smart Grid Cyber Security, September 2010 Owner's Project Performance Requirements Tool More on Occupant Emergency Plans, GSA Occupant Emergency PlansDevelopment, Implementation, and Maintenance, The Federal Protective Service Protective Glazing Manualby PGC International, 2010 Edition Vulnerability Assessment of Federal Facilitiesby Department of Justice.Private Sector Guidelines ASCE 7-10,Minimum Design Loads for Buildings and Other Structures ASCE Standard 59-11,Blast Protection of Buildings, 2011 ASIS GDL PSO-2010Private Security Officer Selection and Training ASIS GDL FPSM-2009Physical Security Measures ASIS GDL WPV 09-2005Workplace Violence Prevention and Response ASIS GDL IAP 05-2007ASIS Information Asset Protection Guideline Design of Blast Resistant Buildings in Petrochemical Facilities, Second Editionby American Society of Civil Engineers (ASCE), 2010 International Building CodeBACK TO TOPMAJOR RESOURCESWBDGBuilding Envelope Design GuideFenestration SystemsExterior DoorsResource PagesBlast Safety of the Building Envelope,Chemical/Biological/Radiation (CBR) Safety of the Building Envelope,The Site Security Design Process,Landscape Architecture and the Site Security Design Process,Effective Site Security Design,Cost Impact of the ISC Security Design Criteria,The BollardToolsProtective Design CenterTool also includes software developed by the USACE and maintained on thePDC web sitethese include SBEDS, VAPO, CEDAWS etc.Security Information and Technologies Exchange (SITE)SITE is a website for accessing and providing information on best practices and existing and emerging products, systems and technologies that can provide protection for federal facilities. The project is supported by the Technology Best Practices Subcommittee of the U.S. Department of Homeland Security (DHS) Interagency Security Committee. SITE was developed by DHS Science and Technology Directorate, Infrastructure Protections and Disaster Management division and is managed by the National Institute of Building Sciences.Websites Department of Homeland Security, Science & Technology, Infrastructure Protection & Disaster Management Division Federal Emergency Management Agency (FEMA) Interagency Security Committee (ISC) Protective Design Center Security Information and Technologies Exchange (SITE) The Infrastructure Security Partnership (TISP) Unified Facilities Criteria (UFC) U.S. Access Board U.S. General Services Administration Building Security Technology ProgramSecurity Centers Department of Defense (DOD) Anti-terrorism bodyPentagon's J34 Federal Emergency Management Agency (FEMA) All-Hazard Mitigation Program on Anti-terrorism Naval Facilities Engineering Service Center (NFESC), Security Engineering Center of Expertise ESC66E-mail:[email protected] USAF Electronic System Center (ESC), Hanscom AFB U.S. Army Corps of Engineers, Electronic Security Center U.S. Army Corps of Engineers, Protective Design Center U.S. Department of Defense U.S. Department of Homeland SecurityOrganizations and Associations American Society of Civil Engineers (ASCE) ASCE Building Security Certified Professional ASIS International Battelle Memorial Institute, National Security Program Center for Strategic and International Studies (CSIS) Centers for Disease Control and Prevention (CDC) DoD Security Engineering Working Group (no website) Federal Facilities Council (FFC) Standing Committee on Physical Security and Hazard Mitigation(Sponsored by National Academies of Science) FM Global International CPTED Association (ICA) Multihazard Mitigation Council National Crime Prevention Council National Defense Industrial Association (NDIA) National Institute of Standards and Technology (NIST) Postal Security Group (PSG) Protective Glazing Council (PGC) Security Industry Association (SIA) Security Analysis and Risk Management Association (SARMA) Society of American Military Engineers (SAME) The Infrastructure Security Partnership (TISP)Trade Journals / Magazines Homeland Security Today Government Security News Security Magazine Security ManagementTraining Courses FEMA E155Building Design for Homeland Security ISC training courses WBDG03 Planning for Secure Buildings WBDG10 Seismic Design Basics WBDG11 Site Security Design Process and StrategiesTools Cyber Security Evaluation Tool (CSET) Integrated Rapid Visual Screening Tools (IRVS)Others 21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Editionby Randall I. Atlas, 2013 Agent-Based Simulation of Human Movements During Emergency Evacuations of Facilities.(PDF 168 KB)Joseph L. Smith, PSP, Applied Research Associates, Inc. Anthrax-Contaminated Facilities: Preparations and a Standard for Remediation(PDF 104 KB)by the Congressional Research Service. 2005. Creating Defensible Spaceby Oscar Newman. Washington, DC: U.S. Department of Housing and Urban Development, April 1996. Crime Prevention Through Environmental Design by Ray Jeffery, 1977 National Symposium of Comprehensive Force Protection, Society of American Military Engineers (SAME), Charleston, SC, Oct 2001. Lindbergh & Associates. NIST WTC Investigation: Building Standards and Codes: Who is in Charge? Situational Crime Prevention, 2d Ed by Ronald Clark, 1977 Protecting Building Occupants from Biological ThreatsWebsite from the Center for Biosecurity of UPMC that includes useful information about biological threats to building occupants, practical steps for reducing risk, and costs and benefits of risk reduction measures, along with a wealth of related materials and additional resources.

http://www.wbdg.org/design/provide_security.php