Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Consistency Adds to Access Effectiveness

By Jeffrey Dingle
April 1, 2008


I had the opportunity recently to travel to Washington D.C.  When we’re looking for examples of almost any kind or type of security system, that’s the place to see them all.  I had business at several federal agencies; and, while in town, I took the opportunity to visit several museums, both public and private.

The first idea that struck me concerning the diversity of access control methods was: What are we trying to accomplish?

When it comes to access control, there were many different approaches to what constitutes “access control.”  Access control varies from specifically controlling WHO has access to simply trying to assure that anyone (or everyone) who enters a facility does not have anything that can cause harm -- generally weapons or explosives -- even if we don’t know who they are.

The Who and What of Access

One method assumes safety because we know (and we assume trust) those of whom we allow access.  The other method suggests that if we’re careful about WHAT we let into our facility, then we’re less likely to have an incident.

Identifying WHO the person is before allowing access requires that we have the ability to positively identify a person, and that we have previously decided who we want to have access.  The U.S. Government is beginning to require positive identification with requirements such as HSPD-12. 

TWIC, the Transportation Worker Identification Credential, is a good example.  TWIC was established by Congress through the Maritime Transportation Security Act (MTSA) and is administered by the Transportation Security Administration (TSA) and U.S. Coast Guard. TWICs are tamper-resistant biometric credentials that will be issued to workers who require unescorted access to secure areas of ports, vessels, outer continental shelf facilities and all credentialed merchant mariners.

Control Vs. Authorizing

Determining whether the person is expected or allowed access is an issue within an overall access control design.  In most applications, the person controlling access is not a person that can determine whether or not access is allowed.  In other words, the person at the gate (generally a security officer) only ENFORCES an access list. He or she does not determine it.

On my trip, I ventured to the National Cryptologic Museum. The museum is the National Security Agency’s principal gateway to the public. It shares the nation’s as well as NSA’s cryptologic legacy and place in world history.

It is not possible to get onto the grounds of the NSA unless you are an employee, or you had specific business and you were expected (No “cold calls” there.).  The NSA stops all vehicles on the perimeter of the facility, and positively checks “government issued” identification, and determines whether or not you get access.  EVERY vehicle is checked, and it is time consuming.  Oddly, there is no access requirement to enter the National Cryptologic Museum.  There is no entrance fee, and there is no searching of bags or possessions.

In Your Possession

Open access facilities often determine what a person HAS in their possession before allowing access.  Often, the goal is to determine that a person desiring access has no METAL in their possession, but there are many non-metal materials that are dangerous.

Many museums in the D.C. area post “bag check in progress” signs at all entrances.  At one public access museum, a uniformed security officer was standing at the door and looking into purses and bags, while everyone went through a metal detector.  The bag check was cursory, and I walked through the metal detector with a camera, money clip, watch and a pocket full of change without setting off an alarm.

It was clear to me that the security was superficial, and mostly being done for appearances, not actually for effect.

High Risks, Better Access Control

Higher risk brings more extensive access requirements.  The FBI Building was surrounded by marked “FBI Police” vehicles, and every entrance was manned by uniformed police officers – a very physical presence. Other buildings in the area used dogs.

One federal office I visited had an extensive access control system in place.  There was a single access point into the building and the entrance was supported by several armed security officers.  Employees were required to wear identification badges.  A visual inspection of the badge was conducted by a security officer, and that allowed access into the building.  Card readers throughout the building restricted access to specific areas within.  A visitor management system scanned a visitor’s “government issued” identification to quickly capture identification info straight from the user’s card. The collection of this information was followed by a real-time capture of an image of the visitor.  Visitors are required to pass through a metal detector, and any alarm resulted in the hand “wanding.”

There is a lack of consistency as to what exactly constitutes access control.  In creating, designing or managing an access control system, the important question remains. What are you trying to accomplish? Pretending to create a secure environment doesn’t make it real. 

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeff Dingle is assistant director of special projects for LSI, a U.S.-based anti-terrorism, homeland security and physical security training company. He has been a Federal Criminal Investigator, security manager at a FORTUNE 15 company and ran the security operations for a former U.S President for eleven years. He can be reached at JeffDingle@LSIeducation.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Turning to Access Control Turnstiles

    See More
  • Get Into Access: Back Doors and Magic Words

    See More
  • Access Control and Training

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing