Forced Entry / Duress Access Tutorial

Author: Brian Rhodes, Published on May 17, 2018

Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for criminals, unsuspecting people inside are vulnerable.

But 'Duress Access' is a common, although overlooked, access system feature to combat the threat.

In this note, we examine the duress options for common types of access readers:

  • Biometrics
  • Keypads
  • Card Readers

And we address how opening design, closed access areas, and physical layering adds strength to perimeter access control for such risks.

Criminals Force Users To Unlock Doors

In general, once entry is made and the criminal is able to enter a building, the primary security boundary keeping people safe has been breached.

Forced entry has been an entry path for criminals in several events, notably in 2015's mass shooting inside French tabloid 'Charlie Hebdo', where active shooters forced an employee holding her child to enter her door PIN code at gunpoint in order to gain access.

Once inside, they murdered 10 people. Armed Responders only arrived in force at the scene more than 30 minutes after the killers fled.

The overall risk includes less violent acts, including theft or burglaries, where armed bandits wait for unsuspecting users as they key in codes or present cards, only to force Tailgating into a facility to commit crimes.

Vulnerability Even In High-Security Deployments

Access control only works when credentials are protected and unable to be misused. Making sure the doors and openings are protected is not enough.

**** ****** ****** ******* ******** ***** ****** ****, ********* **** revealed * *********** *****. ** ***** *** ****** ** ****** doors *** *********, ************ ****** ****** *** **********.

*** '****** ******' ** * ******, ******** **********, ****** ****** feature ** ****** *** ******.

** **** ****, ** ******* *** ****** ******* *** ****** types ** ****** *******:

  • **********
  • *******
  • **** *******

*** ** ******* *** ******* ******, ****** ****** *****, *** physical ******** **** ******** ** ********* ****** ******* *** **** risks.

Criminals ***** ***** ** ****** *****

** *******, **** ***** ** **** *** *** ******** ** able ** ***** * ********, *** ******* ******** ******** ******* people **** *** **** ********.

****** ***** *** **** ** ***** **** *** ********* ** several ******, ******* ** ****'* **** ******** ************ ******* '******* *****', ***** ****** ******** ****** ** ******** ******* *** ******* ***** *** ******* ****** ******** ** ***** ** **** ******.

**** ******, **** ******** ** ******. ***** ********** **** ******* in ***** ** *** ********* **** ** ************ *** ******* ****.

*** ******* **** ******** **** ******* ****, ********* ***** ** burglaries, ***** ***** ******* **** *** ************ ***** ** **** key ** ***** ** ******* *****, **** ** ******************* * ******** ** ****** ******.

Vulnerability **** ** ****-******** ***********

****** ******* **** ***** **** *********** *** ********* *** ****** to ** *******. ****** **** *** ***** *** ******** *** protected ** *** ******.

[***************]

*** *******, ******** ******** ** ******* ***** *** *** * casual ******, *** *** *********** ****** ** ******** *********** ***** a**** ******** ******. *** ******** *** * ********* ****** ******* ****** *** a ********** ******** **** ********* ** * ******. ****** **** shooting ***** *** **** *** ********, *** ****** ******* ** employee ** ** ****** *** ****** *** ** **** *** main ******** ** ********. **** *****, **** *** ******** ****** to *** ******.

** **********, *** ******** ** '**** ***** ** **** ***********?' is ***** ** ****, ********** ** ***** ******* ** * similar ****** ****** ** **** ******* *** **** ****.

Access ****** ****** *******

** *** **** ** ******* * ******* ** **** *****, an ******** ******* *** ****** ** ********* ***********, *** **** seconds ** ******* *** ******** *** ** ****. ************* *** the **** ** ******* *****, ********* ****** **** *******, *** making ******* ** *** ******** ****** ***** **** ** *** very ***** ******** *** ****** *** *********** ******* *** ****.

** *******, *** **** ****** ********** ***** ** ** ********** to ******** ****** *** ***** **** * '******' ****** ** sent **** * ******. **** ** *** **** ****** ****** does *** ***** ****** *******, * ****** **** ** ****** can ** ********** *** ***** *****-******* ******** ***** ******* ******* ********* ************* ** * ****** *****.

** ********, *** ******** *** ************* **** ***** * ********** for ****** ************* ** ****** **** *******:

**********

*** **** ********** *******, ** ** ******** ** ********* ********** 'emergency ****' *********** ** **** (**: *** ****-**** ***** ****** than *** *****-**** *****), *** **** ****** ******, *** ****** are ****** ** ********* ********/*********** ** *** ****** ******* **** notification ** **** ** ****** **********.

** ******* '******' *********** ********** ** ***** *********'* ***************, *** *** ******* *** ******** *** ******* ** **** biometric ****** ********** ********:

** * ********, *** *** ** ***** *** ****** ** different **** **** ** ******** ********, *** ****** *** ******, officers *** ** ************ ****** ** ******* ********* ** **** raised ** * **** ***** ** ********* *** ****.

Keypads

******* ****** *** ********** ** ***** ******** ******* ****, ******* *** *** ** *** ******** ** ********* *** duress. ** * **** ****** * ******* ****, **** ** an ********'* *** ** ******* *****, ** * *** ***** 'emergency ****', *** ****** ******* *** ****, *** **** ****** and ******** ***** *********.

*****, ** * ********, *** *** *** ****** ** ********* than ******, *** ***** ***** ****** *** **** **** *** or ***** *** ******** **** *** ********* ** ***** **********.

Card *******

*************, *** ** *** **** ****** ************** ******* **** *** the ******* '******' ******** **************. **** ******* ***** ***** ******** cards, *** ***** ** '*********' **** **** ******* *** **** as * ****** ********** ***** *** **** ******** ********* ****** if ****.

*******, **** *******, ****************'******* *' ********** *******, ***** ** * **** ***** ***** ***** ***** times ** ***** ********** * '****** *****' ** ********* *** may ****** ***********.

*******, ****-***** ******* *** ***** ** ***** ******** ** ***** costs ** ***** ** ******** *** *********, *** ****** *** card ******* ******* ***** ** ********* **** *** **** ************* as ***** *******.

Building ****** ******* ****** *****

*******, *********** *** ******* ** ***** ***** **** ******** ******** to ******** *** ********* ****** ** ****** ***** ** ********.

* *** ** ****** ****, ** ****** ***** ******, ** to **** **** **** *** ********** **** *** ******* ** segregate ******. ****** ******* *************************, *********** *** ******* ******** ******** (**: ***** *****, ********, office *****) **** ********** ******* ****** *** **** ****** ** unprotected ***** *** ******** ********* ********** **** ** ********* *******.

Avoiding ***** ***** ** ********

********** ** *** ****** ** ****** ****, ******** ******** *** designers ****** ********** ***** ********* *** **** ********** ** *** systems **** ******.

****** **** '***** *** *******' *** *** ************ * ******* act, *** ****** ** *** ** ******** *** **** ********** value ******* ** ****-**** ******** *******. **** * ****** ****** system *** *** ****** ** ******** *** ***** *** ******* Hebdo *** **** ** ****** *********, *** ********* *** **** been **** **** *****.

*** ***** ****** *** ******** ******** *** **** ********** ******** are ** ******** ********** ************ **** ******* *** ******** *****.

Comments (3)

* ******* **** **** *** ******* ** **** **. ** used ** **** ****** ** *** “******** ******* *** ******* and *** ******”.

******** ** *** **** *********** *** ****** ** ******** *** to *** ** ** **** **** *********, *** **** ***** the ******** ** * ***** ****** ***** *** ** *** methods **** **** ** ******** *** **** ***** ** *** up ** ****.

***** ** **** ** *** ****** *********** *** ** ************ by *** ***********.

** ******, *** **** ****** *** *** ***** **** ** 1999 *** ***** ***** ** *** ******* ****!

*****, ** * ********, *** *** *** ****** ** ********* than ******, *** ***** ***** ****** *** **** **** *** or ***** *** ******** **** *** ********* ** ***** **********.

*** ***: ****** *** *** ** ******* *****...

*'* ********* ** ****** ** ****** ********** ****** ******* **** sort ** ***** ***** ******** *********. **** ****** *** ** put **** ******* **** **** **** ** * *******?

***** *'* ***** *******. ***** *'* *********** ****** *** ****** by ** ******** ****-************. *******, *** ******* ***** ********* *** among *** **** *********** ** ******* ** ********* *** ***** in *******.

******** ** *****, *** ***** *** ************ ******* **** *** effective *** ******* ********* ******* ****** ******** **** *** ***** talking ***** *** * ********** (***-**********) ***********?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

'Secure Channel' OSDP Access Control Examined on Jun 21, 2018
Despite claiming to be better than Wiegand, OSDP's initial releases did not address the lack of encryption between reader and controller, leaving...
IFSEC 2018 Final Show Report on Jun 20, 2018
IPVM attended the IFSEC show for the first time this year. The Chinese took over the show, centered on Hikvision, flanked by Dahua, Huawei and a...
Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...
Access Control - Time & Attendance, Mustering and Mantraps Guide on Jun 13, 2018
Electronic access offers features that traditional mechanical locks cannot. While these features may not be as fundamental as keeping doors secure,...
ReconaSense - The AI / Access Control / Analytics / IoT / Video Company Profile on Jun 12, 2018
One company's ISC West booth stood out for displaying a light-up tower of buzzwords. The company, ReconaSense, pledged to be 'making sense of it...
The Benefits of An Access Control Test Door on Jun 08, 2018
Security system dealers can benefit from having their own access control test door both for demonstrations and training. Inside, we explain the...
Princeton Identity Access 200 Iris Scanners Examined on Jun 05, 2018
Iris recently registered a big jump as a preferred biometric in our Favorite Biometrics survey, but access-ready options can be difficult to...
Keypads For Access Control Tutorial on May 31, 2018
Keypad readers present huge risks to even the best access systems. If deployed improperly, keypads let people through locked doors almost as if...
Ambitious Mobile Access Startup: Openpath on May 24, 2018
This team sold their last startup for hundreds of millions of dollars, now they have started Openpath to become a rare access control small...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...

Most Recent Industry Reports

July 2018 IP Networking Course on Jun 22, 2018
  This is the only networking course designed specifically for video surveillance professionals. Register now. Lots of network training exists...
Installation Hardware for Video Surveillance - Indoor Fasteners on Jun 22, 2018
As part of our Installation for Video Surveillance series, in this note, we cover drywall anchors. A key part of installing security hardware is...
Hikvision ColorVu Integrated Visible Light Cameras Examined on Jun 22, 2018
When it comes to low light, infrared light has become the defacto standard in surveillance. But IR is limited to monochrome images, making colors...
'Secure Channel' OSDP Access Control Examined on Jun 21, 2018
Despite claiming to be better than Wiegand, OSDP's initial releases did not address the lack of encryption between reader and controller, leaving...
Most Wanted Improvements In Manufacturer Technical Support (Statistics) on Jun 21, 2018
5 key areas of improvement and 1 clear wanted support feature were voiced by 140+ integrator responses to: What improvement in manufacturer...
GDPR / ICO Complaint Filed Against IFSEC Show Facial Recognition on Jun 20, 2018
IPVM has filed a complaint against IFSEC’s parent company UBM based on our concern that the conference violates core GDPR principles on...
IFSEC 2018 Final Show Report on Jun 20, 2018
IPVM attended the IFSEC show for the first time this year. The Chinese took over the show, centered on Hikvision, flanked by Dahua, Huawei and a...
Mobotix Releases 'Move' Into 21st Century on Jun 20, 2018
For years, Mobotix stood resolutely against, well, every other manufacturer, selling it as a virtue: MOBOTIX equipment is designed with no...
Cybersecurity Startup VDOO Disclosing 10 Manufacturer Vulnerabilities Starting With Axis And Foscam on Jun 20, 2018
Cybersecurity startup VDOO has uncovered significant vulnerabilities in Axis cameras along with many others not yet disclosed. In this report, we...
Axis Guardian - Cloud VMS And Alarm Monitoring - Released on Jun 19, 2018
Axis has struggled to deliver a cloud-based managed service video platform. Video service providers have utilized AVHS for over a decade, and have...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact