Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Identity Management

Training Security Officers for Better Access Management

There is a human factor of access control, and a correct way to train your enterprise’s security officers to perform this vital task.

By Ami Toben
January 6, 2014

To most people, the term “access control” refers to beeping key-card readers, little lights turning from red to green, doors unlocking and turnstiles opening, but access control also happens to be one of the most important duties that a security officer is tasked with. Whether access control is carried out by electronic means, human actions, or both, the idea is quite simply to control the access of individuals into restricted or controlled areas. There is a human factor of access control, and a correct way to train your enterprise’s security officers to perform this vital task.

First consider where access control should begin. Most people, when thinking about the dynamics of access control, picture it as a verbal and visual interaction between a visitor and a security officer or receptionist – questions and answers might be exchanged, identification might be verified, appointments or guest lists might be consulted. In short, access control appears to take place right at the entrance, at a distance of a few feet between the two parties. And though this type of dynamic is a crucial part of access control, it is only the last part of it.

One of the most important things to teach is that access management should ideally begin as soon and as far away as possible – as soon as a person is first seen to be heading towards the access point. An ideal situation would depend on the access point being configured, and the officer or receptionist being positioned, in a way that would allow a wide field of vision, but the point still remains even in closer quarters – an enterprise’s gatekeeper should begin his or her assessment of an individual as soon as possible, from as far away as possible. This will give them valuable time and distance (even if it is only seconds and feet) to better assess the individual, and act quickly if necessary, before the individual reaches the access point. After all, people do not simply materialize in front of secured entrances; they have to come from somewhere.

As officers screen approaching individuals from a distance, training programs should emphasize the two main visible factors: general appearance (clothing, bags, objects being carried, etc), and body language (stride, demeanor, interaction with environment, focus, etc). It is important to keep in mind that appearance and body language must be assessed within the context of their environments before any determinations of suspicion are made – what might seem suspicious in one area during the day, might be very normal in another part of town at night. Enterprise security leaders should tailor their training programs for each location.

As the distance decreases, the assessment becomes finer and more detailed. A good analogy here is that of a classic filter design – starting with a coarse screening on its exterior, which becomes increasingly finer as you near its center. Access control should be seen in much the same way, beginning with a more general assessment of the individual, and screening increasingly finer details as the individual gets closer. At shorter distances, appearance and body language are still the two most important categories, but as more features become visible, smaller details like bulky items inside pockets, contents of bags (if they are searched), forms of identification and minute signs of nervousness can be assessed as well. Some of the most common indicators of nervousness that can be detected from shorter distances include: sweating, redness or paleness of the face, fast breathing, dryness of the mouth, nervous swallowing of saliva, fidgeting or clasped fingers.

When noticing any item or feature, officers should be trained to ask themselves two questions: “What does this mean about where the person is coming from?” and “What does this mean about where this person is going?” In other words, where and for what reason does the person have or display such a thing, and what might this person’s motivations be, in light of such a thing being brought to this place at this time? These questions should be asked about anything the officer sees, from a large gym bag, to expensive Italian leather shoes, to nervous body language. Each thing says something about the visitor, and though we cannot guarantee that we will get all the answers, the more officers see and the more they ask themselves, the more likely they are to understand what it going on and act on that information to protect the enterprise.

Just like with a jigsaw puzzle, within a few seconds, you will not have enough time to get a perfect picture, but the more pieces you detect and understand, the better idea you will get. Whoever coined the term “You can’t judge a book by its cover” must not have been talking about people approaching a secured access point, because there is a great deal that can be understood about them, as long as you are observant enough, and can ask the right questions.

When close enough to question the person, it is usually a good idea to begin with general open ended questions like “How are you?” and “How may I help you?,” and then, depending on the replies, to follow up with more detailed questions if necessary. In some relatively rare cases, when the person’s replies seem to make sense but sound somewhat rehearsed or strangely nervous, it might be worth asking what I like to call a “silly question.” This type of question is “silly” because it is irrelevant to the situation, a question about the weather, for example. The irrelevance of such a question is exactly the point, because it cannot be anticipated. A reply to such a question will have to come from a more natural and truthful place, and is therefore more likely to expose behavioral inconsistencies such as unusual nervousness.

When it comes to checking identification, there are a number of factors that security officers need to pay attention to. The list of fake ID indicators is always worth remembering, and it should be a frequent feature of ongoing education and training. This includes: poor lamination, peeling or ridged edges, photo not matching the appearance of the person, photo matching too closely the appearance of the person (same hairstyle and clothes), photo not aligned properly, holograms and other security features not present or not working properly, and various other problems with fonts, dates, letters and numbers.

It is, however, important to keep in mind that the main issue is never the ID itself, since an ID is no more than an inanimate object. It is not the ID that is attempting to gain entry – it is a human being that is. “The al-Qaeda training manual explicitly instructs operatives to obtain fake IDs – a key part of the process of their attacks,” says Max Bluestein, Director of Research for the Coalition for a Secure Driver’s License. “This directive was followed by the 9/11 terrorists, and these documents continue to be play a crucial operational role in many of the 60 major terrorist plots uncovered since.” A CSDL report, Counterfeit IDs: A National Security, Public Safety Threat, recommends that enterprises train employees that authenticate identities – such as security officers or desk attendants – how to recognize counterfeit IDs; deploy document scanners to validate security features; and improve information-gathering about fake IDs and ID trends in circulation.

On the access control side, there are a few simple techniques to test fake IDs, and many of them involve testing the ID user. People are known to display a number of behavioral traits when their attempted deceits are scrutinized. The easiest tactic here is to simply stall. A person trying to bluff their way past security is already under pressure, and would therefore like it to be over as soon as possible. The simple act of looking at an ID for 10 or 20 seconds, periodically looking up at the person’s face before returning to the ID, can cause nervous cracks to form in an otherwise plain facade. If more than stalling is necessary, security officers should ask the person if you could show their ID to your manager (whether one is present or not); ask the person if they have another form of ID so the two could be matched up; ask about a detail in the ID (birthday, address, etc); and finally, depending on the answers you get, reserve the right to also ask a friendly little “silly question” before making their determination about the ID, and most importantly, about the person.

For a security director, these training tips can help the gatekeepers of an enterprise gather intelligence about potential threats, alert management (or even other locations) to suspicious characters, and act as a deterrent. Keeping threats outside the enterprise involves more than technology – the human factors, including observation, interrogation and a healthy dose of skepticism, are a necessary component in access control and identity management.  

 

About the Author:

 Ami Toben is an expert in terrorist activity prevention and surveillance detection. He has more than 12 years of military and security experience, and he is currently the Director of Consulting & Training for HighCom Security Services. 

KEYWORDS: fake IDs security officer training security risk management threat detection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Education - Security Magazine

    New California Law Requires Training for All School Security Officers

    See More
  • Kaplan University and IFPO Partner to Expand Access to Higher Ed. and Training for Private Security Professionals

    See More
  • SEC 0718 cover feature

    Training for Better Sports Security: See Something, Say Something, Do Something

    See More

Related Products

See More Products
  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing