Forced Entry / Duress Access Tutorial

Author: Brian Rhodes, Published on May 17, 2018

Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for criminals, unsuspecting people inside are vulnerable.

But 'Duress Access' is a common, although overlooked, access system feature to combat the threat.

In this note, we examine the duress options for common types of access readers:

  • Biometrics
  • Keypads
  • Card Readers

And we address how opening design, closed access areas, and physical layering adds strength to perimeter access control for such risks.

Criminals Force Users To Unlock Doors

In general, once entry is made and the criminal is able to enter a building, the primary security boundary keeping people safe has been breached.

Forced entry has been an entry path for criminals in several events, notably in 2015's mass shooting inside French tabloid 'Charlie Hebdo', where active shooters forced an employee holding her child to enter her door PIN code at gunpoint in order to gain access.

Once inside, they murdered 10 people. Armed Responders only arrived in force at the scene more than 30 minutes after the killers fled.

The overall risk includes less violent acts, including theft or burglaries, where armed bandits wait for unsuspecting users as they key in codes or present cards, only to force Tailgating into a facility to commit crimes.

Vulnerability Even In High-Security Deployments

Access control only works when credentials are protected and unable to be misused. Making sure the doors and openings are protected is not enough.

**** ****** ****** ******* ******** ***** ****** ****, ********* **** revealed * *********** *****. ** ***** *** ****** ** ****** doors *** *********, ************ ****** ****** *** **********.

*** '****** ******' ** * ******, ******** **********, ****** ****** feature ** ****** *** ******.

** **** ****, ** ******* *** ****** ******* *** ****** types ** ****** *******:

  • **********
  • *******
  • **** *******

*** ** ******* *** ******* ******, ****** ****** *****, *** physical ******** **** ******** ** ********* ****** ******* *** **** risks.

Criminals ***** ***** ** ****** *****

** *******, **** ***** ** **** *** *** ******** ** able ** ***** * ********, *** ******* ******** ******** ******* people **** *** **** ********.

****** ***** *** **** ** ***** **** *** ********* ** several ******, ******* ** ****'* **** ******** ************ ******* '******* *****', ***** ****** ******** ****** ** ******** ******* *** ******* ***** *** ******* ****** ******** ** ***** ** **** ******.

**** ******, **** ******** ** ******. ***** ********** **** ******* in ***** ** *** ********* **** ** ************ *** ******* ****.

*** ******* **** ******** **** ******* ****, ********* ***** ** burglaries, ***** ***** ******* **** *** ************ ***** ** **** key ** ***** ** ******* *****, **** ** ******************* * ******** ** ****** ******.

Vulnerability **** ** ****-******** ***********

****** ******* **** ***** **** *********** *** ********* *** ****** to ** *******. ****** **** *** ***** *** ******** *** protected ** *** ******.

[***************]

*** *******, ******** ******** ** ******* ***** *** *** * casual ******, *** *** *********** ****** ** ******** *********** ***** a**** ******** ******. *** ******** *** * ********* ****** ******* ****** *** a ********** ******** **** ********* ** * ******. ****** **** shooting ***** *** **** *** ********, *** ****** ******* ** employee ** ** ****** *** ****** *** ** **** *** main ******** ** ********. **** *****, **** *** ******** ****** to *** ******.

** **********, *** ******** ** '**** ***** ** **** ***********?' is ***** ** ****, ********** ** ***** ******* ** * similar ****** ****** ** **** ******* *** **** ****.

Access ****** ****** *******

** *** **** ** ******* * ******* ** **** *****, an ******** ******* *** ****** ** ********* ***********, *** **** seconds ** ******* *** ******** *** ** ****. ************* *** the **** ** ******* *****, ********* ****** **** *******, *** making ******* ** *** ******** ****** ***** **** ** *** very ***** ******** *** ****** *** *********** ******* *** ****.

** *******, *** **** ****** ********** ***** ** ** ********** to ******** ****** *** ***** **** * '******' ****** ** sent **** * ******. **** ** *** **** ****** ****** does *** ***** ****** *******, * ****** **** ** ****** can ** ********** *** ***** *****-******* ******** ***** ******* ******* ********* ************* ** * ****** *****.

** ********, *** ******** *** ************* **** ***** * ********** for ****** ************* ** ****** **** *******:

**********

*** **** ********** *******, ** ** ******** ** ********* ********** 'emergency ****' *********** ** **** (**: *** ****-**** ***** ****** than *** *****-**** *****), *** **** ****** ******, *** ****** are ****** ** ********* ********/*********** ** *** ****** ******* **** notification ** **** ** ****** **********.

** ******* '******' *********** ********** ** ***** *********'* ***************, *** *** ******* *** ******** *** ******* ** **** biometric ****** ********** ********:

** * ********, *** *** ** ***** *** ****** ** different **** **** ** ******** ********, *** ****** *** ******, officers *** ** ************ ****** ** ******* ********* ** **** raised ** * **** ***** ** ********* *** ****.

Keypads

******* ****** *** ********** ** ***** ******** ******* ****, ******* *** *** ** *** ******** ** ********* *** duress. ** * **** ****** * ******* ****, **** ** an ********'* *** ** ******* *****, ** * *** ***** 'emergency ****', *** ****** ******* *** ****, *** **** ****** and ******** ***** *********.

*****, ** * ********, *** *** *** ****** ** ********* than ******, *** ***** ***** ****** *** **** **** *** or ***** *** ******** **** *** ********* ** ***** **********.

Card *******

*************, *** ** *** **** ****** ************** ******* **** *** the ******* '******' ******** **************. **** ******* ***** ***** ******** cards, *** ***** ** '*********' **** **** ******* *** **** as * ****** ********** ***** *** **** ******** ********* ****** if ****.

*******, **** *******, ****************'******* *' ********** *******, ***** ** * **** ***** ***** ***** ***** times ** ***** ********** * '****** *****' ** ********* *** may ****** ***********.

*******, ****-***** ******* *** ***** ** ***** ******** ** ***** costs ** ***** ** ******** *** *********, *** ****** *** card ******* ******* ***** ** ********* **** *** **** ************* as ***** *******.

Building ****** ******* ****** *****

*******, *********** *** ******* ** ***** ***** **** ******** ******** to ******** *** ********* ****** ** ****** ***** ** ********.

* *** ** ****** ****, ** ****** ***** ******, ** to **** **** **** *** ********** **** *** ******* ** segregate ******. ****** ******* *************************, *********** *** ******* ******** ******** (**: ***** *****, ********, office *****) **** ********** ******* ****** *** **** ****** ** unprotected ***** *** ******** ********* ********** **** ** ********* *******.

Avoiding ***** ***** ** ********

********** ** *** ****** ** ****** ****, ******** ******** *** designers ****** ********** ***** ********* *** **** ********** ** *** systems **** ******.

****** **** '***** *** *******' *** *** ************ * ******* act, *** ****** ** *** ** ******** *** **** ********** value ******* ** ****-**** ******** *******. **** * ****** ****** system *** *** ****** ** ******** *** ***** *** ******* Hebdo *** **** ** ****** *********, *** ********* *** **** been **** **** *****.

*** ***** ****** *** ******** ******** *** **** ********** ******** are ** ******** ********** ************ **** ******* *** ******** *****.

Comments (3)

* ******* **** **** *** ******* ** **** **. ** used ** **** ****** ** *** “******** ******* *** ******* and *** ******”.

******** ** *** **** *********** *** ****** ** ******** *** to *** ** ** **** **** *********, *** **** ***** the ******** ** * ***** ****** ***** *** ** *** methods **** **** ** ******** *** **** ***** ** *** up ** ****.

***** ** **** ** *** ****** *********** *** ** ************ by *** ***********.

** ******, *** **** ****** *** *** ***** **** ** 1999 *** ***** ***** ** *** ******* ****!

*****, ** * ********, *** *** *** ****** ** ********* than ******, *** ***** ***** ****** *** **** **** *** or ***** *** ******** **** *** ********* ** ***** **********.

*** ***: ****** *** *** ** ******* *****...

*'* ********* ** ****** ** ****** ********** ****** ******* **** sort ** ***** ***** ******** *********. **** ****** *** ** put **** ******* **** **** **** ** * *******?

***** *'* ***** *******. ***** *'* *********** ****** *** ****** by ** ******** ****-************. *******, *** ******* ***** ********* *** among *** **** *********** ** ******* ** ********* *** ***** in *******.

******** ** *****, *** ***** *** ************ ******* **** *** effective *** ******* ********* ******* ****** ******** **** *** ***** talking ***** *** * ********** (***-**********) ***********?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

UTC, Owner of Lenel, Acquires S2 on Sep 20, 2018
UTC now owns two of the biggest access control providers, one of integrator's most hated access control platforms, Lenel, and one of their...
Favorite Request-to-Exit (RTE) Manufacturers 2018 on Sep 19, 2018
Request To Exit devices like motion sensors and lock releasing push-buttons are a part of almost every access install, but who makes the equipment...
Door Fundamentals For Access Control Guide on Sep 12, 2018
Assuming every door can be secured with either a maglock or an electric strike can be a painful assumption in the field. While those items can be...
Access Control Course Fall 2018 on Sep 06, 2018
Registration IS CLOSED ends this Thursday. Register now. If you are looking to strengthen your ability to design and deploy access systems or...
Drain Wire For Access Control Reader Tutorial on Sep 04, 2018
An easy-to-miss cabling specification plays a key role in access control, yet it is commonly ignored. The drain wire offers protection for readers...
Directory Of 110+ Video Management Software (VMS) Suppliers on Aug 30, 2018
This directory provides a list of Video Management Software providers to help you see and research what options are available. Listing...
Exit Devices For Access Control Tutorial on Aug 28, 2018
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety codes the world over, and become integral parts of electronic access...
Assa Aperio Wireless Access Reader R100 Tested on Aug 23, 2018
Wireless access control is frequently promoted by manufacturers as a way to cut installation costs. Perhaps the biggest proponent of this is mega...
Synology Surveillance Station VMS Tested on Aug 22, 2018
With so many low-cost NVRs and enterprise VMSes, is there any place in the market for NAS-based VMSes? Recently, IPVM bought a Synology NAS for...
Backup Power For Maglocks Guide on Aug 20, 2018
When the main power fails, many believe maglocks must leave doors unlocked. However, battery backed up maglocks are allowed according to IBC /...

Most Recent Industry Reports

Alexa Guard Expands Amazon's Security Offerings, Boosts ADT's Stock on Sep 21, 2018
Amazon is expanding their security offerings yet again, this time with Alexa Guard that delivers security audio analytics and a virtual "Fake...
UTC, Owner of Lenel, Acquires S2 on Sep 20, 2018
UTC now owns two of the biggest access control providers, one of integrator's most hated access control platforms, Lenel, and one of their...
BluePoint Aims To Bring Life-Safety Mind-Set To Police Pull Stations on Sep 20, 2018
Fire alarm pull stations are commonplace but police ones are not. A self-funded startup, BluePoint Alert Solutions is aiming to make police pull...
SIA Plays Dumb On OEMs And Hikua Ban on Sep 20, 2018
OEMs widely pretend to be 'manufacturers', deceiving their customers and putting them at risk for cybersecurity attacks and, soon, violation of US...
Axis Vs. Hikvision IR PTZ Shootout on Sep 20, 2018
Hikvision has their high-end dual-sensor DarkfighterX. Axis has their high-end concealed IR Q6125-LE. Which is better? We bought both and tested...
Avigilon Announces AI-Powered H5 Camera Development on Sep 19, 2018
Avigilon will be showcasing "next-generation AI" at next week's ASIS GSX. In an atypical move, the company is not actually releasing these...
Favorite Request-to-Exit (RTE) Manufacturers 2018 on Sep 19, 2018
Request To Exit devices like motion sensors and lock releasing push-buttons are a part of almost every access install, but who makes the equipment...
25% China Tariffs Finalized For 2019, 10% Start Now, Includes Select Video Surveillance on Sep 18, 2018
A surprise move: In July, when the most recent tariff round was first announced, the tariffs were only scheduled for 10%. However, now, the US...
Central Stations Face Off Against NFPA On Fire Monitoring on Sep 18, 2018
Central stations are facing off against the NFPA over what they call anti-competitive language in NFPA 72, the standard that covers fire alarms....
Hikvision USA Starts Layoffs on Sep 18, 2018
Hikvision USA has started layoffs, just weeks after the US government ban was passed into law. Inside this note, we examine: The important...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact