Don’t Duck the Ductwork

June 20, 2008
/ Print / Reprints /
ShareMore
/ Text Size+
Manbars need to be half-inch diameter steel and welded in place five inches on center.


With today’s global uncertainty, many enterprises and government agencies are building sensitive compartmented information facilities (SCIF).

In particular, those who perform sensitive work for the government are building these types of spaces. A SCIF space is a space where sensitive information may be stored, used, discussed or processed. The goal of these types of rooms is whatever type of information is available in the space cannot be heard or seen outside that space. There are some unique challenges involved when designing the mechanical systems for such a space.



Beyond the manbars, a 1.5 hour fire damper is needed.

COMING THROUGH DUCTWORK

In a typical mechanical design, many ducts enter and leave the SCIF space in the plenum ceiling. If the building exists, there may even be some ducts that do not service the area but pass through it. For an SCIF facility, each duct that is greater than 96 square inches that passes to or from the SCIF area to an unrated space shall be protected with manbars. However, any duct that has one dimension less than six inches does not require manbars. Figures 1.1, 1.2 and 1.3 show typical manbar construction in ductwork passing from an SCIF area to a nonrated area.

Figure 1.1 illustrates that the manbars shall be half-inch diameter steel. The bars must be welded in place five inches on center. The walls between the SCIF areas and non-SCIF areas must have a 2-hour firewall rating. In addition to the manbars at the wall penetration, a 1.5-hour fire damper is needed for all duct penetrations.

Ducts are not the only equipment that need manbar protection through the SCIF perimeter wall. Pipes also need to be protected if they are greater than 96 square inches or greater than 6 inches in direction. An inspection port is also required at the wall penetrations from SCIF to non-SCIF. The inspection port is typically located on the SCIF side of the penetration. The port is typically located on the secure side so no one from the non-secure side can tamper with the port. It is acceptable, however, to locate the port on the non-secure side as long as it is locked. Most inspection ports installed are hinged access doors as shown in Fig. 1.3, but an inspection window is also acceptable.

Sound can travel through a ductwork system at any size. To meet accreditation standards, proper sound attenuation is needed for each duct penetration to or from the space. There are several ways security can meet this requirement. The first method, less popular than some, is to place sound baffles directly inside the ductwork. The sound baffles must be metal and positioned no more than 6 inches apart.



A hinged access door on the security side for inspection can work, or you can use an inspection window.

LISTENING IN

The baffles work well, but a preferred method for sound attenuation is to strategically locate sound generators so no coherent sound passes through. The generators need to be connected to the building electrical system and should run continuously. The key with sound generators is to balance them so they are not so loud as to be distracting to people working below the ceiling locations.

There are several challenges in making an area’s mechanical systems SCIF rated and accredited, but with careful design and construction, the space can safely be used for many years.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

September 2014

2014 September

In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+