Forced Entry / Duress Access Tutorial

By: Brian Rhodes, Published on May 17, 2018

Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for criminals, unsuspecting people inside are vulnerable.

But 'Duress Access' is a common, although overlooked, access system feature to combat the threat.

In this note, we examine the duress options for common types of access readers:

  • Biometrics
  • Keypads
  • Card Readers

And we address how opening design, closed access areas, and physical layering adds strength to perimeter access control for such risks.

Criminals Force Users To Unlock Doors

In general, once entry is made and the criminal is able to enter a building, the primary security boundary keeping people safe has been breached.

Forced entry has been an entry path for criminals in several events, notably in 2015's mass shooting inside French tabloid 'Charlie Hebdo', where active shooters forced an employee holding her child to enter her door PIN code at gunpoint in order to gain access.

Once inside, they murdered 10 people. Armed Responders only arrived in force at the scene more than 30 minutes after the killers fled.

The overall risk includes less violent acts, including theft or burglaries, where armed bandits wait for unsuspecting users as they key in codes or present cards, only to force Tailgating into a facility to commit crimes.

Vulnerability Even In High-Security Deployments

Access control only works when credentials are protected and unable to be misused. Making sure the doors and openings are protected is not enough.

**** ****** ****** ******* normally ***** ****** ****, tragedies **** ******** * significant *****. ** ***** are ****** ** ****** doors *** *********, ************ people ****** *** **********.

*** '****** ******' ** a ******, ******** **********, access ****** ******* ** combat *** ******.

** **** ****, ** examine *** ****** ******* for ****** ***** ** access *******:

  • **********
  • *******
  • **** *******

*** ** ******* *** opening ******, ****** ****** areas, *** ******** ******** adds ******** ** ********* access ******* *** **** risks.

Criminals ***** ***** ** ****** *****

** *******, **** ***** is **** *** *** criminal ** **** ** enter * ********, *** primary ******** ******** ******* people **** *** **** breached.

****** ***** *** **** an ***** **** *** criminals ** ******* ******, notably ** ****'* **** shooting ************ ******* '******* *****', ***** ****** ******** forced ** ******** ******* her ******* ***** *** ******* ****** ******** ** ***** to **** ******.

**** ******, **** ******** 10 ******. ***** ********** only ******* ** ***** at *** ********* **** ** ************ *** ******* ****.

*** ******* **** ******** less ******* ****, ********* theft ** **********, ***** armed ******* **** *** unsuspecting ***** ** **** key ** ***** ** present *****, **** ** force************** * ******** ** commit ******.

Vulnerability **** ** ****-******** ***********

****** ******* **** ***** when *********** *** ********* and ****** ** ** misused. ****** **** *** doors *** ******** *** protected ** *** ******.

[***************]

*** *******, ******** ******** at ******* ***** *** not * ****** ******, and *** *********** ****** up ******** *********** ***** a**** ******** ******. *** ******** *** a ********* ****** ******* system *** * ********** security **** ********* ** a ******. ****** **** shooting ***** *** **** the ********, *** ****** grabbed ** ******** ** an ****** *** ****** her ** **** *** main ******** ** ********. From *****, **** *** unabated ****** ** *** inside.

** **********, *** ******** of '**** ***** ** done ***********?' ** ***** by ****, ********** ** those ******* ** * similar ****** ****** ** keep ******* *** **** away.

Access ****** ****** *******

** *** **** ** forcing * ******* ** open *****, ** ******** refusal *** ****** ** immediate ***********, *** **** seconds ** ******* *** response *** ** ****. Unfortunately *** *** **** of ******* *****, ********* cannot **** *******, *** making ******* ** *** existing ****** ***** **** at *** **** ***** hindered *** ****** *** potentially ******* *** ****.

** *******, *** **** access ********** ***** ** be ********** ** ******** handle *** ***** **** a '******' ****** ** sent **** * ******. Even ** *** **** access ****** **** *** claim ****** *******, * custom **** ** ****** can ** ********** *** event *****-******* ******** ***** ******* ******* ********* ************* of * ****** *****.

** ********, *** ******** and ************* **** ***** a ********** *** ****** notifications ** ****** **** include:

**********

*** **** ********** *******, if ** ******** ** specially ********** '********* ****' fingerprint ** **** (**: the ****-**** ***** ****** than *** *****-**** *****), the **** ****** ******, but ****** *** ****** to ********* ********/*********** ** the ****** ******* **** notification ** **** ** Police **********.

** ******* '******' *********** enrollment ** ***** *********'* ***************, *** *** ******* and ******** *** ******* to **** ********* ****** management ********:

** * ********, *** act ** ***** *** appear ** ********* **** what ** ******** ********, but ****** *** ******, officers *** ** ************ acting ** ******* ********* to **** ****** ** a **** ***** ** emergency *** ****.

Keypads

******* ****** *** ********** as ***** ******** ******* ****, ******* *** *** of *** ******** ** configure *** ******. ** a **** ****** * special ****, **** ** an ********'* *** ** reverse *****, ** * two ***** '********* ****', the ****** ******* *** door, *** **** ****** and ******** ***** *********.

*****, ** * ********, the *** *** ****** no ********* **** ******, and ***** ***** ****** can **** **** *** or ***** *** ******** code *** ********* ** enter **********.

Card *******

*************, *** ** *** most ****** ************** ******* also *** *** ******* 'duress' ******** **************. **** systems ***** ***** ******** cards, *** ***** ** 'emergency' **** **** ******* the **** ** * normal ********** ***** *** that ******** ********* ****** if ****.

*******, **** *******, ****************'******* *' ********** *******, ***** ** a **** ***** ***** badge ***** ***** ** rapid ********** * '****** event' ** ********* *** may ****** ***********.

*******, ****-***** ******* *** prone ** ***** ******** or ***** ***** ** terms ** ******** *** materials, *** ****** *** card ******* ******* ***** to ********* **** *** same ************* ** ***** methods.

Building ****** ******* ****** *****

*******, *********** *** ******* or ***** ***** **** specific ******** ** ******** the ********* ****** ** forced ***** ** ********.

* *** ** ****** time, ** ****** ***** occurs, ** ** **** more **** *** ********** exit *** ******* ** segregate ******. ****** ******* like*********************, *********** *** ******* internal ******** (**: ***** rooms, ********, ****** *****) with ********** ******* ****** can **** ****** ** unprotected ***** *** ******** emergency ********** **** ** potential *******.

Avoiding ***** ***** ** ********

********** ** *** ****** or ****** ****, ******** managers *** ********* ****** absolutely ***** ********* *** true ********** ** *** systems **** ******.

****** **** '***** *** victims' *** *** ************ a ******* ***, *** lesson ** *** ** misgauge *** **** ********** value ******* ** ****-**** security *******. **** * modern ****** ****** *** not ****** ** ******** all ***** *** ******* Hebdo *** **** ** duress *********, *** ********* may **** **** **** even *****.

*** ***** ****** *** security ******** *** **** assessment ******** *** ** evaluate ********** ************ **** current *** ******** *****.

Comments (3)

* ******* **** **** *** ******* ** **** **. ** used ** **** ****** ** *** “******** ******* *** ******* and *** ******”.

******** ** *** **** *********** *** ****** ** ******** *** to *** ** ** **** **** *********, *** **** ***** the ******** ** * ***** ****** ***** *** ** *** methods **** **** ** ******** *** **** ***** ** *** up ** ****.

***** ** **** ** *** ****** *********** *** ** ************ by *** ***********.

** ******, *** **** ****** *** *** ***** **** ** 1999 *** ***** ***** ** *** ******* ****!

*****, ** * ********, *** *** *** ****** ** ********* than ******, *** ***** ***** ****** *** **** **** *** or ***** *** ******** **** *** ********* ** ***** **********.

*** ***: ****** *** *** ** ******* *****...

*'* ********* ** ****** ** ****** ********** ****** ******* **** sort ** ***** ***** ******** *********. **** ****** *** ** put **** ******* **** **** **** ** * *******?

***** *'* ***** *******. ***** *'* *********** ****** *** ****** by ** ******** ****-************. *******, *** ******* ***** ********* *** among *** **** *********** ** ******* ** ********* *** ***** in *******.

******** ** *****, *** ***** *** ************ ******* **** *** effective *** ******* ********* ******* ****** ******** **** *** ***** talking ***** *** * ********** (***-**********) ***********?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Mobile Access Usage Statistics 2019 on Jul 18, 2019
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new...
How To Troubleshoot Wiegand Reader Problems - Inverted Wiring on Jul 16, 2019
Wiegand is the dominant method of connecting access readers, but problems can arise for installers. In fact, one of the most difficult reader...
Nortek Blue Pass Mobile Access Reader Tested on Jul 11, 2019
Nortek claims BluePass mobile readers are a 'more secure and easy to use approach to access', but our testing uncovered security problems and...
Poor OSDP Usage Statistics 2019 on Jul 09, 2019
OSDP certainly offers advantages over decades-old Wiegand (see our OSDP Access Control Guide) but new IPVM statistics show that usage of OSDP, even...
Directory of 60 Video Surveillance Startups on Jun 25, 2019
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known. 2019...
HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...
Genetec Synergis Cloud Link - Complex, Costly and Confusing on Jun 18, 2019
Genetec's Synergis Cloud Link is complex, costly and confusing compared to competitor access control architectures. Inside this note, we examine...
Biometrics Usage Statistics 2019 on Jun 17, 2019
While face and fingerprint recognition are used regularly for smartphones, it is not as common in physical security. In this note, we examine...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Dumber Techs, Bad Box Movers, Says Australian Distributor on Jun 10, 2019
Techs today are "dumber" than they used to be, despite better education and training and that makes a typical day "frustrating" for one...

Most Recent Industry Reports

History of Video Surveillance on Jul 19, 2019
The video surveillance market has changed significantly since 2000, going from VCRs to emerging into an AI cloud era.  The goal of this history...
Mobile Access Usage Statistics 2019 on Jul 18, 2019
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new...
New GDPR Guidelines for Video Surveillance Examined on Jul 18, 2019
The highest-level EU data protection authority has issued a new series of provisional video surveillance guidelines. While GDPR has been in...
Wyze AI Analytics Tested - Beats Axis and Hikvision on Jul 17, 2019
$20 camera disruptor Wyze has released free person detection deep learning analytics to all of their users, claiming users will "Only get notified...
Anyvision Aims For 2022 Revenue of $1 Billion on Jul 17, 2019
Only 3 video surveillance manufacturers do a billion dollars or more in annual revenue - Hikvision, Dahua, and Axis. Now, Anyvision plans to join...
HD Analog vs IP Guide on Jul 16, 2019
For years, HD resolution and single cable signal/power were IP camera advantages, with analog cameras limited to much lower resolution and...
How To Troubleshoot Wiegand Reader Problems - Inverted Wiring on Jul 16, 2019
Wiegand is the dominant method of connecting access readers, but problems can arise for installers. In fact, one of the most difficult reader...
ZeroEyes Gun Detection Startup on Jul 16, 2019
A gun detection video analytics startup, ZeroEyes, is being led by a group of 6 former Navy SEALs, aiming to "save lives" by using AI to assist...
Motorola Acquires Watchguard, Adds to Vigilant And Avigilon on Jul 15, 2019
2 years ago, Motorola had no position nor relevancy to video surveillance. Now, they own major video surveillance, LPR and body camera providers...
Hikvision Global News Reports Directory on Jul 15, 2019
Hikvision has received the most global news reporting of any video surveillance company, ever, ranging from the WSJ, the Financial Times, Reuters,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact