Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Cleveland Transit Authority: Integrating CCTV, Access Control and Life Safety

By John Mesenbrink
March 14, 2002
Whether they take a bus to work, ride the train to the airport or travel among the 59 municipalities it serves, Greater Cleveland Regional Transit Authority’s riders logged nearly 60 million trips a year. The RTA is one of the largest transit systems in the United States. That makes it especially difficult to provide a safe environment for its 4 million riders and 3,000 employees, and protect its many buildings, millions of dollars of physical assets and the more than $30 million it collects in fares every year.

When John K. Joyce, the RTA’s Chief of Police and director of security took his post in 1991, personal safety and protecting assets were long-standing concerns. “Personal crime and safety issues were always number one and two on our surveys back then,” he says. His first step to address the issues was to formulate a plan to integrate the four independent security systems he inherited. Over time he added CCTV in public areas and offices, electronic access control at RTA facilities and voice emergency call boxes for passengers and employees.

After six years of progress, Joyce hired Bernard Buckner in 2000 as security systems manager to upgrade the existing equipment and oversee the integration of the system.

Buckner found that the RTA’s 28 CCTV cameras, 750 controlled doors and between 8,000-10,000 life safety monitoring points were hardwired into a 20-year-old mainframe computer. The system had a number of operational drawbacks. For example, the mainframe was not Y2K compliant, so all 2001 entries had to be dated 1990, the last year that days and dates corresponded to 2001. The CCTV system recorded images on remote VCRs located throughout the RTA’s domain, which posed a logistical problem because tapes had to be manually replaced.

The RTA has the potential for many types of incidents. For example, almost all the money it collects is in small bills and change that is hard to control. To guard against loss or theft, the authority uses CCTV to follow fare boxes from the bus or train to devaulting stations, to an armored car. Also, key control, while much improved over the original master key system, had room for improvement. It was difficult to invalidate keys that were lost or held by former employees, and doors could not be controlled remotely, so security or custodial people often had to travel to a remote site to open doors manually.

Digital CCTV Streamlines Security

Joyce and Buckner began talking to the authority’s long-time system consultant, SimplexGrinnell, about upgrading and integrating the CCTV, access control and life safety systems. Buckner believed the most efficient and economical approach would be an integrated, networked approach that would consolidate control over all three systems.

SimplexGrinnell recommended replacing the hardwired mainframe-based system with Andover Controls’ network-based Continuum system, and the analog CCTV system with a digital system by Integral Technologies, a company owned by Andover Controls.

But first Buckner had to convince the RTA’s IT department to let him switch from his collection of leased and dial-up lines to their system-wide Ethernet network. The Ethernet was used for everything from groupwide communications to time and attendance recording, and went almost everywhere Buckner needed a connection. However, the IT group was concerned about the network resources that the Continuum system would use. “But once we showed them the specs, they realized we’d use very little bandwidth,” Buckner says. The RTA began installing the Continuum system in 2000.

The Integral Technologies digital CCTV system, with its networking support, provides the RTA with real financial and operational benefits. The Integral system streamlines surveillance by enabling departments to access a digital video recorder over the network and view the images on a local PC.

The DVX recorders have more storage capacity than the VCRs. One reason is that the new digital cameras have built-in motion detectors, so nothing is recorded if there is no activity. That boosts the DVX disk’s capacity to more than three times of that of the VCRs—an average of 31/2 months of images compared with one month.

Integrating Access and Safety

While Buckner was upgrading the RTA’s CCTV system, he also had in place a five-year program for upgrading the access control and life safety systems and integrating them with the Continuum system. The RTA controls about 750 doors and many more life safety systems, which includes smoke detection and enunciation devices, duress or “panic” buttons and elevator and escalator monitors. Buckner says one of the biggest benefits of the Continuum system is that the RTA did not have to do anything special to piggyback any of these monitoring points on the network.

Another characteristic of the system, Buckner says, is the fact that its intelligent remote controllers will continue to operate if there is a network failure. “The Andover ACX access controller has all the intelligence needed to keep the local units running and gathering data,” Buckner says. Finally, Buckner praises the Continuum’s ability to create pre-formatted and ad hoc reports quickly and easily. The reporting capability has helped to dramatically reduce the number of security breaches throughout the RTA. Every week, Buckner creates reports of security breaches and e-mails them to the appropriate single access control coordinator (SACC), who controls access in an area. The SACC investigates each breach and corrects its cause. The reports enabled one SACC, who had logged 80 to 90 breaches a week, to reduce them to an average of two.

Data gathered from the integrated system can be tracked and enable the transit police to anticipate needs and determine if their responses affected the number of incidents. Joyce also plans to enable transit police officers to file reports on their own laptop computers and upload them to a central database.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Mesenbrink is managing editor for SECURITY Magazine. He can be reached at 630-694-4026

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Seeing the Light with CCTV Cameras

    See More
  • Reaching the Top in Access

    See More
  • Physical Access Cruising at DaimlerChrysler

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing