How to Implement a Unified
Security Management Platform:
A Case Study From the University of Kentucky
Nathan Brown
University of Kentucky Police Major
Tom Sorrell, RCDD
BCCLT, Inc.
A Case Study From the University of Kentucky
Nathan Brown
University of Kentucky Police Major
Tom Sorrell, RCDD
Agenda
• Introductions
• Legacy State of UK SMS/VMS • System Architecture - RFP
• New Deployment/Integration • Robbery Case Study
• Lessons Learned • Questions • Introductions • Legacy State of UK SMS/VMS • System Architecture - RFP • New Deployment/Integration • Robbery Case Study
• Lessons Learned • Questions
UK’s Dilemma
• Who owns security? Who is responsible? • How can UK justifiably “throw away” existing
security infrastructure?
• How can UK manage disparate
technological upgrades for student and staff services?
• How can UK control procurement?
• How can UK afford reoccurring costs?
• Who owns security? Who is responsible? • How can UK justifiably “throw away” existing
security infrastructure?
• How can UK manage disparate
technological upgrades for student and staff services?
• How can UK control procurement?
Pre-Project Conditions
Approximately 1,500 Existing Cameras On CampusAnalog and IP mix
Many Manufacturers and Models
No Central Management: DVR’s, NVR’s, VCR’s, CCTV Monitoring
Out of date University Electronic Security Standards No Electronic Security Master Plan
No Central Ownership
Approximately 1,500 Existing Cameras On Campus Analog and IP mix
Many Manufacturers and Models
No Central Management: DVR’s, NVR’s, VCR’s, CCTV Monitoring
Out of date University Electronic Security Standards No Electronic Security Master Plan
How is this accomplished?
Convergence Video + Access Control + Other Devices This Information Is Then Converted Into Events What Triggers An Event?
Camera Information Access Control
Emergency Call Boxes Contact Closure Devices Audio Detection Devices
Convergence Events
How is this accomplished?
Convergence Video + Access Control + Other Devices This Information Is Then Converted Into Events What Triggers An Event?
Camera Information Access Control
Emergency Call Boxes Contact Closure Devices Audio Detection Devices
What Is Being Done In Other
Campus Environments?
Merging Access Control Systems with: – Video Management Systems
– Audio
– Analytics
– Panic Alarms
Merging Access Control Systems with: – Video Management Systems
– Audio
– Analytics
Threat Deterrent
Improved Response Time
Situational Awareness and Improved Safety for First Responders
Video Forensics
Parent Reassurance and Peace of Mind
Safety Improvements
Threat Deterrent
Improved Response Time
Situational Awareness and Improved Safety for First Responders
Video Forensics
How Do These Features Improve Safety?
• Threat Deterrent
• Improved Response Time
• Situational Awareness and Improved Safety for First Responders
• Video Forensics
• Parent Reassurance and Peace of Mind • Threat Deterrent
• Improved Response Time
• Situational Awareness and Improved Safety for First Responders
• Video Forensics
How Is This Accomplished ?
• Convergence Video + Access Control + Other Devices
• This Information Is Then Converted Into Events
What Triggers An Event ?
• Camera Information
• Access Control
• Emergency Call Boxes
• Contact Closure Devices
• Audio Detection Devices
• Convergence Video + Access Control + Other Devices
• This Information Is Then Converted Into Events
What Triggers An Event ?
• Camera Information
• Access Control
• Emergency Call Boxes
• Contact Closure Devices
UK Facility Staff UK Facility Staff
First Responder
First Responder Status of Local Cameras
UK Police UK Police
First Responder
UK Objectives
• Form an Executive Security Committee
• Assess legacy campus security systems
• Engage users and assess needs
• Review of current and future needs with UKPD and Administration
• Evaluate current security technology solutions available industry wide
• Determine security feature sets desired
• Issue a RFP for Integrated Security System
• Select Security Integrator
• Integrate Video, Access Control and Emergency Notification
• Form an Executive Security Committee
• Assess legacy campus security systems
• Engage users and assess needs
• Review of current and future needs with UKPD and Administration
• Evaluate current security technology solutions available industry wide
• Determine security feature sets desired
• Issue a RFP for Integrated Security System
• Select Security Integrator
System Objectives
• Based on Open Architecture components
• Smart Pro-Active System
• Event Driven / Alert Based
• SMS / VMS to work as one platform
• Web Based system, no thick or thin clients required
• Fully Integrated Mobile Devices
• No on-going License Fees
• Bandwidth Impacts / Local and Wide Area
• Distributed rather than Centralized Topology and impacts
• Integration of Key Legacy Systems without the use of PSIMS
• Based on Open Architecture components
• Smart Pro-Active System
• Event Driven / Alert Based
• SMS / VMS to work as one platform
• Web Based system, no thick or thin clients required
• Fully Integrated Mobile Devices
• No on-going License Fees
• Bandwidth Impacts / Local and Wide Area
• Distributed rather than Centralized Topology and impacts
Hierarchy Objectives
Develop Delegated Authority Administration Model
• Develop Business Units
• Assign Database Administrator (UKPD)
• Assign BSA Business Security Authority
• Assign BSM Business Security Manager
• Delegated Authority to Local Building Users Develop Delegated Authority Administration Model
• Develop Business Units
• Assign Database Administrator (UKPD)
• Assign BSA Business Security Authority
• Assign BSM Business Security Manager
Business Security Authorities
Each building will be required to have a business security authority relationship.
Will have capability to manage their own “security system” with Police backup.
Will have knowledge of the building operations and occupants to ensure proper access rights. Approved by the Division Head/Dean
Each building will be required to have a business security authority relationship.
Will have capability to manage their own “security system” with Police backup.
Will have knowledge of the building operations and occupants to ensure proper access rights. Approved by the Division Head/Dean
Exterior Notification
Emergency Notification Outdoor Speakers
Camera Talk-A-Phone Driven Events:
Exterior Notification Tower:
Talk-A-Phone VOIP Emergency Phone
Emergency Notification Outdoor Speakers
Interior Notification
Alarm system to keep people in buildings.
Partnership with UK Fire Marshal and Office of Institutional Equity and Equal Opportunity
Alarm system to keep people in buildings.
Partnership with UK Fire Marshal and Office of Institutional Equity and Equal Opportunity
Functions of the Wildcard
Identification UK Plus Account Kronos UK Library Card Security Verification Key Not a GPS device Identification UK Plus Account Kronos UK Library Card Security Verification Key Not a GPS deviceCameras/Video Management
Event Driven Video Management
Allows visual confirmation for alerts and other calls for service
Prepares first responders, building
operators, and Business Security Authorities
Assists in searching for active situations Event Driven Video Management
Allows visual confirmation for alerts and other calls for service
Prepares first responders, building
operators, and Business Security Authorities
Gateways
What is a Gateway?
What does the Gateways do?
How does this impact my planning? Who has access to the Gateways? What is a Gateway?
What does the Gateways do?
How does this impact my planning? Who has access to the Gateways?
Gateways Functions
Analytics:People Counting
,
Line Crossing, Activity, Face Capture, Dwell Time, Object Taken, Object Moved, FacialRecognition, License Plate Recognition Lock Down:
UKPD has the ability to from the Central Operations Center to lock Perimeter Doors of any Access
Controlled building or group of Buildings at any time. Analytics:
People Counting
,
Line Crossing, Activity, Face Capture, Dwell Time, Object Taken, Object Moved, FacialRecognition, License Plate Recognition Lock Down:
UKPD has the ability to from the Central Operations Center to lock Perimeter Doors of any Access
Integration Team
• UK Police • UK CPMD • UK IT
• BCCLT Consulting Engineers • Next Level Security Systems
• University of Kentucky Community • UK Police
• UK CPMD • UK IT
• BCCLT Consulting Engineers • Next Level Security Systems
Robbery 1
st(3-31-2014)
• Victim walking south on S. Limestone under pedway approached by three subjects brandishing firearm
• Victim refused to give money or property
• Victim fled from the three subjects and immediately called 9-1-1
• Victim walking south on S. Limestone under pedway approached by three subjects brandishing firearm
• Victim refused to give money or property
• Victim fled from the three subjects and immediately called 9-1-1
Officers Response
• One officer immediately dispatched to interview victim and obtain description • Subjects matching description observed
at S. Upper and Boliver and interviewed by two other officers
• Victim identified suspects who are transported to UKPD for questioning • One officer immediately dispatched to
interview victim and obtain description • Subjects matching description observed
at S. Upper and Boliver and interviewed by two other officers
• Victim identified suspects who are transported to UKPD for questioning
Investigation
• As the suspects were being interviewed the video footage was reviewed
• It became apparent that one of the subjects in the recordings was not presently detained
• This allowed officers to better interrogate and determine the missing person subject
• Officers worked with LPD and to coordinate a traffic stop and make arrest, recover weapon • As the suspects were being interviewed the
video footage was reviewed
• It became apparent that one of the subjects in the recordings was not presently detained
• This allowed officers to better interrogate and determine the missing person subject
• Officers worked with LPD and to coordinate a traffic stop and make arrest, recover weapon
All Systems Deployed
• Exterior Notification (Talk-a-Phone) • UK Alert (email, phone, text)
• Automatic locks confirmed secure facilities Main, Student Ctr, POT, Whitehall
• Cats Path cameras utilized to observe subjects, gather evidence, and enhance interrogations
• Well trained, certified Police officers • Exterior Notification (Talk-a-Phone) • UK Alert (email, phone, text)
• Automatic locks confirmed secure facilities Main, Student Ctr, POT, Whitehall
• Cats Path cameras utilized to observe subjects, gather evidence, and enhance interrogations
Lessons Learned
• ID Card central focus of security system • Stakeholders provide input not decisions • Develop an integration team and an
expansion team
• Create the security standard immediately • Educate capital project management
• Respond to concerned community
• ID Card central focus of security system • Stakeholders provide input not decisions • Develop an integration team and an
expansion team
• Create the security standard immediately • Educate capital project management
Contact Information
Major Nathan Brownnathan.brown@uky.edu
Tom Sorrell
sorrell@bcclt.com Major Nathan Brown
nathan.brown@uky.edu
Tom Sorrell