mE ~
~"""""'='~~"''';'''';''''':t''''''''''==''=""M'' __ '''''''' ___ '_"",''''''' ___ '-'~l
,t r~" r 0 r~ ~ ... ~.. ~~l .~ ... ,:;) "''l "'" 't'f-J ~ 1.1 h""';')l'i I,>, ': ~~~;~;-··~-'l'~ "''; "i ~ lJ \4~J d b l;,i ~~. It ~J ",':;.3 a 1 I Il U .ii. II t":::::; -::";t;;~::"',,·~I'."'::1':-::!:tt;~~..:::;:::;;;:~:::::t'.¢;::::::.~,,;;K..-~:,':'.4.!;l..":~~:;:;~:;:::;:::li:".~<tt::~~;;r''l-~;;n=!W_''Z;~:C':::~J
MITRE" WASHlNGTON Of>EHlATIONS
THE OSPG ARMS ROOM
',\ PHYSICAL SECURITY PROGRAM
AND THE P R I V AT ESE C TOR
FEBRUARY 1972
I] .,
:MTR-6140 W. A. ELIOT .\
-
If you have issues viewing or accessing this file contact us at NCJRS.gov.
f.
d J\
'!l:
- ." ~ >~. ~
" .• -, ~~., "~.<~.,- ,~" ~ .. ~"..,.,....-•.•• ,,< ... t~ .,~_"" """'-~"""''';''''\'''''''''''''<?'''''''''''_i''Y-<I', ........ , ... ....".. ,-_ '. ',,1
.' \
.'
THE DSPGf\ ARMS ROOM
PHYSICAL SECURITY PROGRAM
AND THE PRIVATE SECTOR
A Presentation Before the LEAA-Private Security Conference 16-17 December, 1971, Washington, D. C,
W. A. ELIOT
Contract No.: F19628-71-C-0002
Contract Sponsor: Defense Special Projec.ts,..G.r.qup
MTR-6140
Project No.: 832A 'NCJRS
FEBRUARY 1911
This document was prepared for authorized distribution. I t has not been approved for public release.
, ., ~ ,"
iji:~".;:tt!JII~-(-.r"--" _ ... ~~;""'''.' ~ .. ;-- .;;,....;_~- ~
MAR301977
THE •
MITRE COR· P O' RAT ". <? N
WASHINGTON OPERA'rIONS
..
MITRE Department
and Project Approval:
ii
ABSTRACT
This paper was presented before the LEAl-\:Private Security Conference on 17 December 1971, in Washington, D.C. describing the DSPG Arms Room Physical Security Program.
INFORMATION RETRIEVAL INDEX TERMS:
Security Alarm Police Sensor DSPG
Detection Burglar Intrusion Specification LEAA
iii
I I
4, • L.
TABLE 0:8"' CONTENTS
1\
Pa~ ,}) 1.0 INTRODOCTION 1
2.0 PRESENTATION 2 ;;;::
2.1 l3riefing 4
2.2 Program 4
2.3 Status 9
2.4 Thoughts 21
APPENDIX I 25
APPENDIX II 27
APPENDIX III 31
DISTRIBUTION LIST 33
v
_,~,~ __ jl
Ii
'-----.----....,...,.-.... 44')', ______ """""!"
1.0 INTRODUCTION
On 9 December 1971 an invitation was extended to the
Defense SQecia1 Projects Group (DSPG) by Mr. Charles M.
Coster, Associate Administrator of the Law Enforcement
Assistance Administration (LEAA), to discuss the DSPG
Arms Room Physical Security Program before a LEAA-Private
Security Conference (see Appendix 1). The author was
requested by LTC Thomas H. Brain of the Physical Security
Branch of DSPG, with the concurrence of Mr. Lawrence L.
Holmes of the MITRE Corporation, to make the presentation
on behalf of DSPG.
The agenda for the meeting (see Appendix 2) covers
the proposed relationship between LEAA and the security
industry, and the plans and recommendations for programs
to improve security practice in the commercial and private
sectors. The DSPG paper was included in the agenda as an
example of the physical security work underway in the
Department of Defense and to provide an opportunity for
the workers in the DSPG program to suggest areas that
appear to need additional R&D by the security industry.
The words are entirely those of the author but they rep
resent the common concern of all who have been associated
with the DSPG program. The following is the paper pre-
sented before the LEAA-Private Security Conference.
1
,
J 'I
_. ___ -::.;;.. __ -=-... ~~~~..,.··-: .. ::%~iI:Ii1i ~ •• ·lIilif·i!!I!'·i"!!!' ~~: !!l!!, !!I!lJ!(¥Iif'4~P1l.ityfl!lJMi:ill!:;e=-IIIIII_-.' iii' ·._"iIi·_.o'·o'.· ··ii·_jj'_·.".· o'liIii·· ... ~~·>iiiI···i·.-.·" ...... -.·'--~Wlf-"--
2.0 PRESENTATION
The DSPG Arms Room Physical Securi~y Program and the Private Sector
Description of DSPG
The Defense Special Projects Group is a Joint
Service agency of the Department of Defense, with re
sponsibilities for special projects in the development
of intrusion sensorS for the Military. Most of the work
of the agency has been concerned with tactical sensors
for detecting intrusions against field objectives, and
much of it has been done in support of operations in
Southeast Asia. DSPG, as the Group is called, has had
a special funding authority through the Military Depart
ments to initiate the sensor developments and to produce
the sensors in needed quantities.
Physical Security
In late 1970, with the slow-down of U.S. ac.tivit,y
in Southeast Asia, the special funding authority was
extended into contiguous programs in physical security
covering the development of intrusion detection systems
for fixed installations and arms rooms.
SLIDE 1 - Mission
This is an excerpt of the mission statement~signed
by the Secretary of Defense in December 1970 relating
2
2 0 en en ::lE >-f-a: ::> (,) W en :E 0 0 a: en ::lE a: «
- ,,..,
en' ~ 0
W -:t:W~ ~ I-C-J ::t:>..1 Z
I-o<t ww -ex::1- a::J::2 s:~en 01-1-
20~ u.u.o:: Oo~ 9 ,... en' ::C/)w
I-:E:E w!!:!t;:l <t<tO ::0::'>-0
~ex::O u.~o::,... ~ <{u CC!:Jex:: o~!:w rx:Oen oU..J o
Oex::~ lli~~~ O~ex:: U LI.! <t 2«1u. .;.: ., ~I-O 0::
~Q> <tex::!: I-~ex:: ex::<r.::» wenu CI-W 22 en ::»W-J ex:::E<t Ol-U I-"u; u<t> wflj:r: ex:: e a. ~.
o>-UJffi ~ ,,~(I) <tl-<t I-Ua:l -we -Ju. z ~l:b<t
3
__ ~ _____ -"'3. , __ ~ .... ' ..011 ••• _ ... " ___ JiI_._.;;...,,_ ....... __ ... ~X\t.lI1)IfiI!(!Pr~l ...... 'II!IJlI! __ ~~i Ed 6ijEh" __ ~~-·~ ~.
o
rl
(J) '1j .r-! rl rt.l
' .. ' ..
to physical security. Two programs resulted, one directed
toward bases and installations invt11ving perimeter sensors
and central readouts, and the other directed toward arms
rooms. The arms room task is now nearing completion and
is the subject of this briefing.
2.1 Briefing
SLIDE 2 - Outline
This outlines the topics to be covered. I will
touch briefly on why it was felt the program was nec1ed
and will describe the program itself. Finally, I will
pass along some thoughts we developed during the program
reg~rding the contributions and responsibilities of the
security industry for better physical security.
2.2 Program
In advance of the mission statement by the Secretary
of Defense, an intensive survey was made by us at DSPG of
Military Commanders and specialists concerned with the
security of arms rooms. The purpose was to determine
what the responsible parties felt were their principal
problems and what they would like to see done about them.
SLIDE 3 - Conclusions
The conclusions were very pronounced and they all
centered on problems with the intrusion detectfon e~uip
menta Virtually every person contacted, from Pentagon
4
rr----.-.
w 2 ...I I:::::> o (!) z -u. w -a: co
i"Mii'
:E C/) l- N « C/) :r: a:: :;) CJ cU CJ I- :J
0 ~ 0 I'd a:: J: ·n a,; C/) I- M
• Cf.l ~l •
5
0 tJ) 0 UJ Z t.!.! 0
0 0 UJ e;; UJ UJ
::> UJ 2 2 UJ -I U U UJ
Z u :> 0 :> 0 () 0 « « I-> >- 2 UJ I- UJ > ~ a: 0: Q.,
~ ::> u ::> tJ) UJ 0
CI) UJ
• •
6
0 UJ 0 UJ UJ 2 l-0: 0 Q., Q.,
~ en UJ u 2 « 2 UJ I-2 ;;;: ~
•
official to division security inspector, asked for help
in separating the good equipment from the bad. They all
had tales of purchases that turned out wrong, of equip
ment that failed to perform to expectations or of operators
who failed even to turn the equipment on, and they all
spoke favorably of the concept of central procurement and
standardization, with all the quality assurance, training
and maintenance support this implies. This is not to say
that the equipment was always bad but obviously somebody
needed help and it wasn't being provided. The purpose of
the DSPG program was to 'Provide the standards needed
to fill this gap.
SLIDE 4 - Program
The initial goal of the program was a set of speci
fications that would define the minimum'performance
required of the system components. T~~se specifications
would establish the quality assurance standards and inter
face uniformity needed for procurement to inventory, inde
pendently of any installation. 'IJhis~;gtandardization is
crucial to the subsequent logistics support plan because
of the impact it has on maintenance and training and the
stockpiling of spares.
The manuals describe the selection and installation ...
of system components to allow the bulk of the work t~ be
7
, ...... --~.----.~.---- -.--1-'......,..".""\~ ... .,.,.,..,,;.-._ .... ''"' .... ' ''-.. " ....... --"' .... "'' .. -'~ ..... ,-~.~.-., .... '-'''"'' .... ~.-.,-.~" ............ ~''''',.,.",.---'~
_ ~~ __ .:.!:..::_~-.:' __ ~:::.t.::.:::."t:" ......... ,-<~, ~ ....... "'_ .. ~~ __ ~= .. ". .. ., ....... """. _=.="'_ ........... _ .. ~"""--'I ... ~·'··iiI·· ___ •. _,...;;;; ....... -.. ···,y..,·-.. ··iiiio-.... ··· .... · .... ·· [2l#mi<;;;' eM::.Il!Ii; ;;!I!!!!Ri!i!Iif¥i1II~~&!!!.!!'!l!;i;.· 'iil!' Ii!!!' ~¥~~~ .~~ .... -., iil'"..:.. ".-.
·t
CI:I
'"' CI.l i= >-~ :::;)
t!l CQ
0 ...J
,> -
~. -<")..
:lE CI:I
« ...J CI.l
cr: c2: (.)
(!) ::::I IJJ 2: a..
0 c:!: Cf.)
a: :::E /l..
~ ..(').. ..(')..
CI:I Cf.) CI.l >- IJJ
IoU ,-.. I-
:::- eo: en :::;) IoU a:: l- I-
:::t CI.l Cf.)
8
L
.
"
1/
done by the user with minimum reliance on security·
j specialists.
The tests and studies were conducted early in the
program to support the technical provisions of the speci-
fications. The studies evaluated a number of the real-
world factors that seem to influence the effectiveness of
detection systems. They included analyses of apparent
weaknesses of operational systems and studies of intrusion
barrier effectiveness •
2.3 status
Tests SLIDE 5 - Results
An example of results from the intrusion barrier
study conducted with the assistance of the National Bureau
of Standards is this plot of the relative time required to
penetrate walls constructed of common construction
materials. It shows the unsurprising fact that poured-
core cement block walls are mare resistant to penetration
than wooden walls and that reinforced poured concrete
walls are tougher yet. A less expected observation is
that it takes only seconds to smash through many of the
walls with only a sledge hammer and a strong back. For
instance, in a test in the field, it took only 45 seconds
to batter a 12 by 15 inch hole through an 8-inch mortar-
filled concrete block wall with a lO-pound sledge hammer,
9
. ,<." _~~ _____ ~~_"'~_...,'"~ "'.-~_ -~- _ • 2: '':iEi;;:&Paiw ,.'~ "._.-.-",~",-",::-":~~;,~:.t.~ ..... ~P"""-"""~~,,,,,,.jf;--",,=': ;;:,~.,,,~_,.,.,.,..w.~'"_.·_~ __ •. ""_..,,_ ... _"""'"'_ ... _ ... __ ~ ... ~ ..... ' ........ ""' ... *'--~
C/') ...J
~
" LU
~ ::?E :2 u: 0 0
j:: 0 0:
U 0...
::::l I-w a: -' I- -'
:::l C/') S :2'.:
0 (I) (I)
U <C -' :2'.: c.!J
0 ~
Z 2E <C 0 X U w
-I U. 0 >-I-...J z iii ;;( <:( -' a: E!::. 1- tI)
tI) LU <C
-' :2'.: c.!J LU 0... 2E W
> j:: <:( ...J W a:
0 w u
0 0: 0
W u.. u Z 0: W 0
0: u.. Z
~ 0 W <"l 0 0: 0
oi:! 0 :s: w >- 0 u -' W 0: 0... -I 0 .::J -' u.. <C u: Z
g ... I- ...... W w :.::: w 0: ::E u
~ 0 0::. 0 -' -' W a:l 0... -' 0 w <C z l- N :a <C w 0: 0... 0: 0 x U W Z I- Z -- w 0 0 w 0::. 0 (,,) :t:
OJ ~ en -'
~ I ~ <C :E - 0: .-0 z
0: ~ ffi !\\iiiii
<C CD
~ ::t: ~ ...
0 ...
... z w u:: 0:
i1~1 z ;: :::l
C3 0::. --....
~~------------------~--~~--~ d ii!!iii
Z 0 Z Z LlJz (J) ...J 0 LIJ 0 0 1-0
(f.I LIJ_ ~ i= <t i= i= " I-" U IX! U U UU
::J ::J Z::J LIJ ::J > I- a: " " 0" « I- a: l- I- ul-~ (J) Z (J) (J) o(J) z 0 Z Z w Z I- 0 (J) 0 0 ,,0 z U « U (.) ::Ju LIJ
-0 :"i: ...J 0 " LIJ « L/J LIJ a. en Q. « .... en en Z IX!
« 0 a: 0 t- O
3:
10
> I-::; iii « " I-IJJ Z IJJ Q.
~ LIJ l.1\ > i= ill « 'd ...J ·rl IJJ
rl a: (/)
and only 55 seconds for a 5-inch mortar-filled concrete
block wall with }-inch reinforcing rods.
Other tests conducted in Army and Navy engineering
laboratories consisted of evaluations of the sensitivity
~f available detection techniques to intrusion and false
alarm sources. The word techniques is important. Over
120 items of equipment were tested under controlled con
ditions J not so much to establish that one worked better
than the other but to determine if there was a pattern of
performance that could be associated with a technique.
There was a pattern and the selection of sensors reflects
this.
Specifications SLIDE 6 - System
This is an entirely familiar and conventional system.
It consists of a number of intrusion sensors located at the
arms room and a sensor monitor at the readout site. The
contr~l unit serves as the termination point for all the
sensors and as the secure/access control for the controlled
area. The data transmitter and receiver provide the means
for passing alarm Signals from the arms room to the read-
out site over commercial telephone lines with a high level
~f supervision against line break or tamper.
The alarm unit is an electronic screamer located at
'" the arms room, and used as a backup to the remote monitor.
11
.. ~-';o.".-, .... - . .,- ·..x~ill!j,Q.J!Hi;!:~~:~~~-"-";';:-::.~ .", ,. -"":~-,"-1'" -' , "7",. -"",,, "-.. "'""_"'" __ ,,,,,,.~ __ ,..,_ .. ~. __ ~,,,.~ ... ---.. .. _,,....-.......,,'., ... ____ _
i
I
:E ~ w l-
~ (J)
>-(J)
z ~ 0
i= u ~ W
I--W 0 Z :iii Wa: 0 a: W2:~ Ci.i ct -,Oct
-' W:::c-:::> ct I-Q..Q a: I--Z
12
a: Q I-2: o ~
w > w c:..:I w a:
I-:E CI) 2: ct a: l-
CI)
-'
° a: I-2
° c..')
en a: o en 2 w en
Lt
\0
OJ 'd 'M rl CI)
The telephcne dialer is an optional means of signalling
an alarm by recorded telephone message without the use of
.the remote monitor.
SLIDE 7 - Sensors
The sensors divide into several types. The upper
five are penetration sensors used to detect intrusions'
through the doors and walls of the room. The Balanced
Magnetic Switch detects the opening or removal of doors.
The Passive Ultrasonic Sensor detects the sounds of break-
in at frequencies above normal hearing. The Grid Wire
Sensor detects the actual breakthrough of a fragile sur
face. The Capacitance Proximity Sensor detects the change
in capacitance of a metal grid covering the inside of a
window or opening when the grill is tOUChed. The Vibration
Sensor detects the vibrations of break-in through metal
shutters and screens.
The Ultrasonic Motion Sensor differs from the others
by senSing the motion of an intruder inside the room after
a penetration is made. The .Magnetic Weapons Sensor is
different in another way in sensing the actual removal of
R weapon from the arms rack.
The two Duress Sensors at the end of the list are
strategically located switches used by the arms room
guards to call for help.
:13
a: 0 tI)
::t: IX: Z IX: U 0 W 0 I- tI) tI) tI)
3: z >- ;z w I- w tI) tI)
:ri CI) U S2 X :2 ei) j:: 0 Z IX: a: ex: w 0 0 0 0 j:: 0 Z tI) tI) a: tI) 0 Cf.) (!) <C :2 c.. z :E 2 <C a: w w UJ w :E I- tI) u tI) u
eI) C ..J W :2 :2 :2 w ::::> a: <C 0 0 (,) w
3E l- t: tI)
:2 > U <C <C ~ en « LX: C IX: ..J tI) c.. co ~ <C ~ a: <C :> CO (!) u ::>
• • • • • •
14
, ... <
IX: 0 IX: tI) 0 Z
tI)
IX: Z w 0 w tI)
tI) r:-tI) z :2 en 0 w tI)
OJ c.. tI) w "d <C a: tI) .r! w tI) ::::>
3: w C rl U X. w v:l j:: ::::> ..J c co w
~ .., Q "'" C!J W <C X a:
i.i: 0 :E c..
• • •
---< <--
\\' ..........
All of these items are covered by specifications
that leave considerable leeway for design initiative and
no leeway at all for perforlnance and interface.
SLIDE 8 - Specification
Every item is specified separately and all follow
the standard Mil Spec format shown. The specifications
have been completed and will probably be distributed
within the Government before the end of Calendar 1971.
Manuals SLIDE 9 - Manual
The principal manual is an Employment Manual that
aids the nonspecialist user to select the detection
system components appropriate to his own arms room. This
is a new approach to security installation and it is
brought about bJ a recognition of the fact that with over
10,000 arms rooms in the Continental United states, there
is little hope of assembling a large enough army of specia
lists qualified to give every room indi~idual expert
attention.
The manual describes the threat facing military
arms rooms and describes the general characteristics of
the rooms themselves. The identification of the threat
is important because of the impact it has on the type of
line supervisicn needed. Also, it is important where
'" users might be tempted to apply the system to other than
15
I
I
., I
"
• I.
~ 1
~ ~j I ,
~ ,1 j "I ~I w "
\' I ~
I \
L l
1
f-' 0'\
f-' --J
r
Ii!
SPECIFICATIONS I
• DESCRIPTION
• REQUIREMENTS
• PERFORMANCE
• RELlI>,DlI..1TY
• TESTS
... FORM & FUNCTION
• PERFORMANCE
• RELIABILlTY
• ORDER1NG DATA
Slide 8
CONTENTS OF EMPLOYMENT MANUAL
• INTRODUCTlmJ • THREAT • PURPOSE • SCOPE • APPROACH
• ARMS ROOM CHARACTERISTICS • PHYSICAL CHAAACTERISTICS
• VULNERABILITIES
• AVAI lABlE SYSTEM COMPONENTS • SYSTEMS DESCRIPTION
• ADVANTAGES
• DISADVANTAGES
• SPEC IDENTIFICATION
• SYSTEM COST
• COMPONENT SELECTION PROCEDURE • VULNERABILITY SURVEY INSTRUCTIONS
• ENVIRONMENTAL ANALYSIS INSTRUCTIONS
• EQUIPMENT SELECTION PROCESS,
Slide 9
•.• --. -"""~-'- ,._< .--,-. -' ..• ~
arms rooms; what works in an arms room may be entirely
inappropriate in a bank.
The manual also describes the system and establishes
a rationale for the selection of components for instal-
lation. This is the crucial part that allows the user to
make a preliminary estimate of requirements. Later manuals
will provide the instructions for installation.
SLIDE 10 - Logistics
The Logistics Support Plan, which is prepared by the
military departments, establishes the responsibilities for
procurement and maintenance following production release.
The draft plan currently in preparation confirms the con-
cept of central procurement to military specifications
and establishes responsibilities for depots and schools.
Follow-On
In summary, the specifications and the Employment
Manual have been completed but not released for use. The
Logistics Support Plan and the Installation Instructions
are in draft and will be completed by the time the system
is in production.
SLIDE 11 - Follow~On
The next step is to procure a limited quantity of ~
items to specification to set the stage for full scale
production in Fiscal Year 1973.
Z « ...J 0-
f-a: 0 0-Q.,
::::> (/l
(.)
~ C!l 0 ...J
I-z tI) tI) w
:!E :lE I-W <t 0 tI)
a: w c. -I w ::::l I- 0 0 u z 0
0
0 0 w ::I: r-I
U a: j:: z u 0. tI)
([)
-I U <t Cl
'd ::::l Z
<t 0 w 2 'rl
a: 0 I-tI) r-I
I- Z Z w CI)
a: <C a:: z I- <C <t w Z a: u :!E I-0. tI)
• • • • 4)
19
, - ,,,,,~,,_;;,,_~,,,",,, .. ., ,',."0(", w;.;:;MF.:esw;'.;a;;,";i;;i te:.~ ,.~' ... , _ ~.-. .. ~ ... ' .:' ....,.. ;;;,.'""~"'" ·--·t~ ''"h.,.,.,.'t'C'.'~~ , ,-....,""'~-- '''''_"'''''' .............. ,.'''' ... .,.._--'f' ....... ''ti''''' .... ~ .... '''"'_..:'' ___ w,. ......
:2 <.( ...J 0..
Z q 3: o ...J ...J o U.
N ~ >u. \
~ 2: UJ ::E UJ a: ::;) u o a: c.. 2: o ~ ::;) o o a: c.. UJ 0::
•
. ~ >u. I
(f)
~ UJ ::E UJ a: ::;) u o 0: Q.
2: o ~ ::;) o o 0:: Q.
•
20
··· .... F ..... ·.~ ...-... = .. "....-=. = .. ' -------. ~~ .. ~ "-"='" = .. = .... = .... = .... =.-.= .... = ............. .
2.4 Thoughts
Now what has all this accomplished? First., the
Department of Defense now has the necessary criteria to
allow it to test what it buys and ultimately to exercise
firm configuration control. The system format for ev~ry
arms room is identical and the interfaces and equipment
characteristics are uniform regardless of the manufacturer.
This makes maintenance and training programs feasible and
goes a long way to insure that the field is not going to
be populated with systems that don't work.
Second, the stage is set for central procurement of
equipment for all Services. The advantages in cost and
quality control are obvious,
Finally, with the equipment characteristics estab
lished and with the operational concepts in hand, the
military departments are now in a position to deal with
the system aspects of physical security. ~his refers to
all of the factors that determine whether an arms room
will be successfully protected against attack. Factors
that influence a thief to conclude that a particular arms V
room is vulnerable can be determined. Arms room archi-
tectural standards can be reviewed in terms of the im~act
of construction on intrusion detection, and vice versa. .. ...
Military police practices can be reviewed in terms of the
21
~ I
response interface. In short, the military can rethink
i0s security directives without the burden of dependency
on conflicting practices and cross currents of the alarm
industry.
Now, I'm sure everyone has taken comfort so far in
the fact that the DSPG program has addressed itself only
to military arms rooms. This orientation was very clear
throughout the orogram and in fact, attempts to generalize
the results to other applications were resisted. On the
other hand, it is hard to escape the obvious parallels in
the private sector; intrusions always have the same harmful
effect and arc usually just as destructive; detection
systems look the same and use the same equipment; police
acceptance of alarm equipment is no better in the private
sector than in the military.
This being the case it is reasonable to assume that
obvious improvements in the one area have their parallel in
the other and that things can be done to improve the
quality of physical security practice. I'll name just a
few:
First and foremost, it is mandatory that steps
be taken 30 establish meaningful standards for performance
and quality. There is so much questionable equtpment on
the market and it's sold so aggressively that even the
22
industry sometimes professes dismay. The problem is more
one of quality and application than technology however.
Reliability has to be improved and the design features
that affect the real usefulness of a device as an element
of a protection system have to be emphasized. It has been
our observation that R&D has to be directed not so much
toward new methods of detecting intrusions as toward
methods for not detecting everything else.
Second, and in direct support of this first
point, it is necessary to educate the user to the criteria
that justify the use of intrusion detection equipment.
Does an XYZ device attached to the door of a cleaning
establishment really accomplish an improvement in the
security? At the risk of overlooking much that has been
done, it appears to us that many personnel in the industry
need as much education in this area as do the users. ~
Third, and this is perhaps
of all, the whole question of security
'\ I,
the hardest ta~k if I:
t t · . .Jih pro ec lon ln ~ e I, II
private sector has to be dealt with as a system problem.
It is no longer adequate simply to demonstrate that an
alarm will be tripped when an intruder crosses a thresh
old. Either the industry :i-s going to determine what ~lse II.'
it takes or the public will establish its own standards . ..
23
. APPENDIX I
UNITED STA'l'ES DEPART1fEm OF JUSTICE
LAW ENFORCEMENT ASSISTANCE ADMINISTRATION
W.ASHINGTON. D.C. 20530
OFFICI! OF TH1l ADMINISTRATION
Colonel Thomas H. Brain Building 56 U,S. Naval Observatory 34th and Massachusetts Avenue, N.W. Washington, D.C.
Dear Colonel Brain:
December 9, 1971
On December 16 and 17, 1971, this Agency is convening a conference involving representatives from the private security sector, the alarm industry, and related areas. The purpose of this conference is to discuss the research and development efforts of this Agency in the private security field and to identify the problems which currently exist.
Because of your work in the evaluation of numerous types of alarm systems, I would like to hav~ you make a 30 minute presentation to this conference on December 17, 1971. Your presentation should include a general summary of your work in alarm system evaluation and a forward look to the needs for research and development in this area. The session to which you will make the presentation begins at 9:00 a.m.
If for any reason you cannot make this Mr. Robert R. Donlan of my office.
ifr1' -./
;';/-' ," / /~
/t1arence M. Coster
Sincerely,
Associate Administrator
cc: Marshall Esler
presentation, please contact
Law Enforcement Standards Laboratory
Martin Danziger
25
. .. ~.- .• - "" ->" .. i.7,.-,.,-""!>'< ... .,.I>"·."'.~"",· .• ~, ... ,,_,~~ ... ~~_ ........ ~h.,.~.,...., __ ~,_ ... _-->~_ .. ~"_ ... '"" .............. ,~"""'''''~ .. ~-·
•. v'·',; --"'~l.-"" '~.'''~-'' c_ •• ~~,~~.jtW4a:'f/,!eia~=---_: ~""_;.:...:~.~~:-~_ '~~""i\< -~ .....
APPENDIX II
AGENDA
PRIVATE SECURITY CONFERENCE
December 16, 1971
9:00 - 9:30 Opening Comments-Jerris Leonard, Administrator
10:30-11:30
Law Enforcement Assistance Administra~ion
I. Relationship between LEAA and Security Industry
A. Nature of Relationship-·Clarence M. Coster Associate Administrator Law Enforcement Assistance
Administration
1. What should it be to produce the most optimistic results
2. LEAA-Industry Liaison Committees
B. Parallel Effort of LEAA and Security Industry to Control and Prevent Crime
1. The Institute equipment program
Marc A. Nerenstone National Institute of Law Enforcement and
and Criminal Justice
2. Project NI 70-064: Burglary: A Study of Its Character, Correlates, Correctives and Causes
Dr. Harry A. Scarr Human Sciences Research, Inc. McLean, Virginia
3. The LEAA impact plan
Martin B. Danziger Acting Assistant Administrator National Institute of Law
Enforcement & Criminal Justice 11 :30 - 1 :00 LUNCH
27
I
I :00 ~ 3 :00 II. Utilization of Industry Experience in Crime Detection and Prevention
3:00 - 5:00
December 17, 1971
Louis A. Mayo National Institute of Law Enforcement &
Criminal Justice
A. Project NI 70-057: Private and Auxiliary Public Police in th~ United States
B.
Mr. Sorrel Wildhorn Rand Corporation
Home Alarms-How, when, how much?
Louis A. Mayo National Institute of Law Enforcement &
Criminal Justice
Contractual activity of LEAA in security field
Robert R. DOnlan Executive Assistant to the Associate
Admillistra tor Law Enforcement Assistance Administration
I. LEAA procedures
2. Contracts-RFPs-Dissemination of Information
3. Review of Sylvania contract, purpose objective process of award
4. Review of Cedar Rapids grant
5. Jackson, Mississippi contract
9:00 - 10:30 III. Suggested improvements-Clarence M. Coster
1. Minimum training standards for private security forces
2. Coordination between private security forces and governmental units
3. Need for research and development in private security sectorWarner Eliot Department of Defense
Marshall Esler Law Enforcement Standards
Laboratory
28
I '
4. SBA StudY-Chester Smith, Esq, General Counsel Senate Small Business Committee
5. Possible licensing for private security forces and alarm services
10:30-11 :30 IV. Project NI 70-082: Physical Design for the Improvement of Security in Residential Environments
11:30-12:30 V.
..
Professor Oscar Newman Graduate School of Public Administration New York University
General discussion of identified problems and recommendations, summary and close of meeting
29
'-•• ~-"." --..,._-.., ~ '."17".+-~. >.,....-.<>1,""-"~ , """.,'''-'>,,,-, ....... , ___ "-'' ..... -''''.'"''~,,.'''''' ........ ,, ..... , __ ._ • .;..""" ... "_ .. M......, .. ",;><4.,..I' .. _..,._~..:-. --=~ ~- " tT .~ .
.-------____ -~5"ii ... ="'""""_-~_. __ iiiiiiii .... ===~='~- _. --
APPENDIX III
Private Security Conference December 16 & 17, 1971
LIST OF PERSONS WHO ATTENDED
Jerome Banack Honeywell, Inc.
Roger Battie Burns Electronics Security Services, Inc.
Richard Bugbee American District Telegraph Company
William Byer Alarm Device Manufacturing Company
Jack Caulfield White House
F. S. Chance Brinks, Inc.
Frank Cole W;lls Fargo Alarm Services
. W'$~liam L. Cole . 13rinks, Inc.
Robert Conklin Holmes Electric Protective Company
William Cornforth Systron Donner Corporation
Clarence M. Coster LEAA
James J. Cusack American Courier Service
Martin Danziger LEAA
Garis Distelhorst National Burglar & Fire Alarm Association
Robert R. Donlan LEA A
31
Robert O. Donnelly American District Telegraph Company
Robert Douglas Emhart Corporation
Warner Eliot Department of Defense
Marshall Isler Law Enforcement Standards Lab
A. R. Frye Wackenhut Corporation
Eugene L. Fuss Honeywell, Inc.
Harold Gray Pacific Fire Extinguisher Company
A. 1. Gross ADTCompany
J amecl C. Hensler Wells Fargo Alarm Services
John J. Horan Pinkerton's, Inc.
Jerris Leonard Administrator, LEAA
William Lutz Burns Electronics Security Services, Inc.
Louis Mayo LEAA
Marc A. Nerenstone LEAA
Professor Oscar Newman New York University ..
, I
Gene A. Pack Burns In ternational Security Services, Inc.
Norval Poulson Certified Burglar Alarm Systems, Inc.
Martin H. Reiss· Alarmtronics Engineering, Inc.
Norman Rubin Supreme Burglar Alarm Corporation
Dr. Harry Scarr Human Sciences Research, Inc.
Fritz Schumacher Walter Kidde and Company, Inc.
R. W. Shirley Merchants Police Alarm Corporation
Chester Smith, Esq. Senate Small Business Committee
Wallace Smith Alarm Industry Committee for Combating
Crime
Richard W. Velde LEAA
Ralph Ward Mosler Electronic Systems
George Weinstock Morse Signal Devices, Inc.
Sorrel Wildhorn Rand Corporation
Francis E. Wilkie Biebold, Inc.
John A. Willis Pinkerton's, Inc.
Victor R. Zahn Wells Fargo Signal Systems, Inc.
32
' ...... ' ..
/: !
I I
t'i .! ;
n
D-36
DISTRIBUTION LIST
Warner A. Eliot 25
33 il
, -, ._"~,~,~,,.., ~",",~,·_w~ .. ~""",·,y,,,,,·,,, .• _~.~~·~.~ ___ ~ •• ~_,,,, .~ .. _~