Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Consistency Adds to Access Effectiveness

By Jeffrey Dingle
April 1, 2008


I had the opportunity recently to travel to Washington D.C.  When we’re looking for examples of almost any kind or type of security system, that’s the place to see them all.  I had business at several federal agencies; and, while in town, I took the opportunity to visit several museums, both public and private.

The first idea that struck me concerning the diversity of access control methods was: What are we trying to accomplish?

When it comes to access control, there were many different approaches to what constitutes “access control.”  Access control varies from specifically controlling WHO has access to simply trying to assure that anyone (or everyone) who enters a facility does not have anything that can cause harm -- generally weapons or explosives -- even if we don’t know who they are.

The Who and What of Access

One method assumes safety because we know (and we assume trust) those of whom we allow access.  The other method suggests that if we’re careful about WHAT we let into our facility, then we’re less likely to have an incident.

Identifying WHO the person is before allowing access requires that we have the ability to positively identify a person, and that we have previously decided who we want to have access.  The U.S. Government is beginning to require positive identification with requirements such as HSPD-12. 

TWIC, the Transportation Worker Identification Credential, is a good example.  TWIC was established by Congress through the Maritime Transportation Security Act (MTSA) and is administered by the Transportation Security Administration (TSA) and U.S. Coast Guard. TWICs are tamper-resistant biometric credentials that will be issued to workers who require unescorted access to secure areas of ports, vessels, outer continental shelf facilities and all credentialed merchant mariners.

Control Vs. Authorizing

Determining whether the person is expected or allowed access is an issue within an overall access control design.  In most applications, the person controlling access is not a person that can determine whether or not access is allowed.  In other words, the person at the gate (generally a security officer) only ENFORCES an access list. He or she does not determine it.

On my trip, I ventured to the National Cryptologic Museum. The museum is the National Security Agency’s principal gateway to the public. It shares the nation’s as well as NSA’s cryptologic legacy and place in world history.

It is not possible to get onto the grounds of the NSA unless you are an employee, or you had specific business and you were expected (No “cold calls” there.).  The NSA stops all vehicles on the perimeter of the facility, and positively checks “government issued” identification, and determines whether or not you get access.  EVERY vehicle is checked, and it is time consuming.  Oddly, there is no access requirement to enter the National Cryptologic Museum.  There is no entrance fee, and there is no searching of bags or possessions.

In Your Possession

Open access facilities often determine what a person HAS in their possession before allowing access.  Often, the goal is to determine that a person desiring access has no METAL in their possession, but there are many non-metal materials that are dangerous.

Many museums in the D.C. area post “bag check in progress” signs at all entrances.  At one public access museum, a uniformed security officer was standing at the door and looking into purses and bags, while everyone went through a metal detector.  The bag check was cursory, and I walked through the metal detector with a camera, money clip, watch and a pocket full of change without setting off an alarm.

It was clear to me that the security was superficial, and mostly being done for appearances, not actually for effect.

High Risks, Better Access Control

Higher risk brings more extensive access requirements.  The FBI Building was surrounded by marked “FBI Police” vehicles, and every entrance was manned by uniformed police officers – a very physical presence. Other buildings in the area used dogs.

One federal office I visited had an extensive access control system in place.  There was a single access point into the building and the entrance was supported by several armed security officers.  Employees were required to wear identification badges.  A visual inspection of the badge was conducted by a security officer, and that allowed access into the building.  Card readers throughout the building restricted access to specific areas within.  A visitor management system scanned a visitor’s “government issued” identification to quickly capture identification info straight from the user’s card. The collection of this information was followed by a real-time capture of an image of the visitor.  Visitors are required to pass through a metal detector, and any alarm resulted in the hand “wanding.”

There is a lack of consistency as to what exactly constitutes access control.  In creating, designing or managing an access control system, the important question remains. What are you trying to accomplish? Pretending to create a secure environment doesn’t make it real. 

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeff Dingle is assistant director of special projects for LSI, a U.S.-based anti-terrorism, homeland security and physical security training company. He has been a Federal Criminal Investigator, security manager at a FORTUNE 15 company and ran the security operations for a former U.S President for eleven years. He can be reached at JeffDingle@LSIeducation.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Turning to Access Control Turnstiles

    See More
  • Get Into Access: Back Doors and Magic Words

    See More
  • Access Control and Training

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing