Charlie Hebdo Forced Entrance and Access Control Measures

Author: Brian Rhodes, Published on Feb 09, 2015

Electronic Access Control usually reassures people they are safe, but a recent tragedy in France reveals a big flaw.

During the massacre at Charlie Hebdo, gunmen forced a hostage to use credentials to open a door. Once inside, they murdered 10 people. Armed Responders only arrived in force at the scene more than 30 minutes after the killers fled.

In this note, we examine two options - duress credentials and physical layering to strength access control for such risks.

********** ****** ******* ******* ********* ****** **** *** ****, *** a ****** ******* ** ****** ******* * *** ****.

****** *** ******** ** ******* *****, ****** ****** * ******* to *** *********** ** **** * ****. **** ******, **** murdered ** ******. ***** ********** **** ******* ** ***** ** the ********* **** ** ************ *** ******* ****.

** **** ****, ** ******* *** ******* - ****** *********** and ******** ******** ** ******** ****** ******* *** **** *****.

[***************]

The *****

*********, ****** ******* *** **** ****** ******** ******* ******* ******* ******* *********** ******** ** ***** *** ******* ****** ***** ** **** ******.

The *************

******** ** ******* ***** *** *** * ****** ******, *** the *********** ****** ** ******** *********** ***** ***** ******** ******. *** ******** *** * ********* ****** ******* ****** *** a ********** ******** **** ********* ** * ******. ****** **** shooting ***** *** **** *** ********, *** ****** ******* ** employee ** ** ****** *** ****** *** ** **** *** main ******** ** ********. **** *****, **** *** ******** ****** to *** ******.

****** ******* **** ***** **** *********** *** ********* *** ****** to ** *******. ** **** ****, ** ******** *** *** child **** ******* **** ***** ** ****** ***********.

** **********, *** ******** ** '**** ***** ** **** ***********?' is ***** ** ****, ********** ** ***** ******* ** * similar ****** ****** ** **** ******* *** **** ****.

What *** ** ****?

*************, ********* ****** **** *******, *** ****** ******* ** *** existing ****** ***** **** ** *** **** ***** ******** *** gunmen *** *********** ******* *** ****. **** ******** ** ******* that ***** **** **** * **********:

****** ***********: ** *** **** ** ******* * ******* ** **** doors, ** ******** ******* *** ****** ** ********* ***********, *** even ******* ** ******* *** ******** *** ** ****. ** the ***** *********, ** ******* ** **** ************ *** **** to *********. *** ****** ****** ** ****** *** **** ********* readers ** * ******* **** ** * ******* **** ** entered (**: *** ********'* *** ** ******* *****) ** ** an ******** *********** ** **** (**: *** ****-**** ***** ****** than *** *****-**** *****), *** **** ****** ****** *** ***** a ******* ********* *** ****** *** ****** ** *** ****** through **** ************ ** **** ** ****** **********.

**** ****** ** ********* ****** ** **** ****** ** '******' or '*****' *************:

******** ******:******* *** ** ****** **** ** ** **** **** **** one ********** ******* ** ********* ******. ****** ******* *************************, *********** *** ******* ******** ******** (**: ***** *****, ********, office *****) **** ********** ******* ****** *** **** ****** ** unprotected ***** *** ******** ********* ********** **** ** ********* *******.

***** ***** ** ********: ******* *** *** ******** ******** *** ********* ** ** avoid ********* *** **** ********** ** *** ******* **** ******. Rather **** '***** *** *******' *** *** ************ ** * heinous ***, *** ****** ** *** ** ******** *** **** protection ***** ******* ** ****-**** ******** *******. **** * ****** access ****** *** *** ****** ** ******** *** ***** *** Charlie *****, *** *** ***** ****** *** ******** ******** *** risk ********** ******** *** ** ******** ********** ************ ** ******* and ******** *****.

Comments (5)

***** ******* ** ***** ***** ****** ** * ******* ** the *** ******* ** ******* *** ******* **** ** *** not **** ******* ***** ******. ** * **** **** **** project ********** ****** ***** * **** ** ******** ***** **** story **** ********** *** ************ **** ******* *** *********** *******.

*** ****** ******* **** **** *** ** ******* ******** **** be **** ** *** ****** ******* *** ****** ******. ******** leading ** *********** ** ******* *** *** ****** ******. *********, duress ******** ****** ** ** *********** ** ********.

*** ****** **** ***** * ****** ** ******** **** ******? A ****** ******* ***** **** ** ******** ****** ****** *** longer ** ****, ******* **** *** ********* ******* ***** ******* about **. ** *** **** ***** *** **** ** **** other, ******** * ****** ******* ****** ***** *** ***** **** to **** ***** *** *******, *** ****** **** ***** ***** seconds, *** ** *****.

***, ** ******, *****'* *** ******* ** ******* ************ ******* alerting *** ********* **** * ************ ** ***** ****.

* ****** *** *** ** ** ***** *** **** **** give *** ****** ** ** ******** *** ****'* **** **** sending * ****** ****** ***** ****** ** ****** ****** *** loud ******.

**** *******. * ****** *** ** ******* ** **** **** to "**" ******, ** "****" ******? **** *** *** ******* different ******. ** ** *********** ** **** ** *** ***** professionals ******* ** *** ******** **** ** *** *******. **** Ellifritz ************************** ***** *********** *** **** ******** *** ******:

1) ***’* ****** ** ******* ******** ******** ** **** *** ****. The doors to the magazine’s office were locked. That didn’t matter to the terrorists. They just waited for an employee, held her hostage and told her they would kill her unless she let them in. From the ***** ****:

“‘* *** **** ** **** ** ** ******** ** *** care, ******** ** ***** ** *** ******** ********, ***** *** masked *** ***** *** ******** ********** **,’ **** ** ***….’**** said **** ****** ** ** ** ** *** *******, ** I ****** ** *** ****,’ **** ** ***, ********* ** the ****-**** ******** ****** ** *** *****-*****.”

**** ***** *** ** ** **** *********? * *** **** of *** ***** *** *** ********** ****** ** ***** ** prevent **** **** ******* *** *** **** *****. **** **** locked ***** *** *** **** *** ****** ** ***** **** Elementary (** **** * **** ******* * ****** *** *******), locked ***** ****’* **** *** ****** ****. *** ********* *** be ********** ** ********* ** **** *** ******** *********. ***’* think *** *** **** ******* *** **** ** **** ** a “******” ********.

** *** *******, *** *** ** ** **** **** *** attackers *** ******* ** ****** ** ***** ****** ***** ** switch ********* ******* ** ********* **** * ***'* ***** **** be ********** **** ***** ** * *** **** ** ***** head. ** ****** ******** ****** **** ****** **** **** ** a *********, *** * ***'* **** **** ** ** **** based ** ** *** ***********.

* ***'* **** **** *** ****** ****** **, *** * feel **** ** ** **** **** ** **** * ********** attacker **** ******, ********** ******** ********. ********* **** ***** ******* and ********* *********** ** *** ** ********, *** **** ******* magazine ****** ** *** **** *****.

******* ******************** ** ** ****** ***** *********** ******** ********** ****** is **** ** *** ******** **** **** ** ********* ** the ******** ****. *** **** ********* **** **** * **** fitings **** ***** *** ****** ** * **** **** * torpedo ******. ********* * *********** *** *** ****** ** ** to **** *** ****. * **** **** ****** ********* ** a ***** ******* ** ****. ********** *** ** *****, ****** control, *** ******* *** ******* ******** ********. ** *** ****** for * ***** ******** ******** *************, ******** *** *********/******** ********.

**** *****,

* **** **** **** ******* *** *** *** ***'* ******* how **** **** * **** **** ****** ****** ***** ****. I ** ****** ** * *** (*** ***** **) ***** concerned ** **** ****** ******.

**** ******* ** ******* *** * **** * *** ***** Duress (***** *** *** *** ********** ***** ***).

****** **** **** * ****** ** ****** * ******* ******* you **** ** ******** *** ****** *********** **** (**** *** don't *** **** *****..). **** ** **** ** *********** ******, it ** ******* ***** ****.

* -** ****** **** *** *** *** ***** **** *****.

*- ** **** ** *******, *** *** *** **** **** index (****** *******). ****'* **** ** ******** ******* * ***'* know *** **** ** ** ***** **** *** ************ ** use *** ****** ***** *** ******** ** * ***. ** this * ***** **** ***** *** ********* ******** (**** ******* exericises) ** *** *** ******* ******.

** ***** ****, ***** *** ******* ****** ** ****** ***** and ***** *** * ***% **** ***** **** *** ** the ********. * ***** ** *** *** ***** *** **********. This ***** *** * ***** *** ***** **** **** ******* prior ** ******. *** ***** **** **** ******.

**** * ****** ****** ** *********, *** ****** ********* **** a "****** *****". **** ** ** ****** ******* ***** **** to *** ******* ***** ** **** **** *** ** *** also ** ** ***** **** ** * **** ** ********** people. ** *** **** ** * *** **** ** ***********, if **********.

(**** ** *** *************: *****://***.**********.***/**/****/***)

** **** *** **** *** ***** ** *** ****** ** the ****. *** ****** ******** ** ******** *** ******* **** if ******* ******* *** ********.

***** **** ***** *** ***** ***, * ****** *** **** has *** **** *********** ... *** * **** **** ********** answers:

- ****** **** **** *** *** ************ ********* ***** (*** forget *** ***)

- ****** **** ***********. *****, ************ ******* *** ****** ********** in ****** (****). ****** ****** *** ********* ** *** *********** technology. ** * ***'* ***** **** *** ******** ***** **** accepted ***** **** "****" ****** **** *** ***** *** **** security. ******, ****** * *********** ****** ** ***** ***** ***** people *********. ******* *** ***'* **** *** ** ***** ** the *******. ****** ***** ****** ******* *** ******** ** ** confidential ** *** **** ******** ***** *** **** *** ******.

- **** ******* **** ** **** *** *** *** *************, he **** **** * ***. *** **** **** *** **** we ***** *** ******* ********* **** ****** *****. ***** ***** it.

* ***** ** **** *********** ** **** **** *** *** CCTV ****** *** ***** ** *** **** ** *** ******. If ******* *** ***********, ****** ******* ** ** **.

***** ***,

****

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Access Control

Smartcard Copier Tested (13.56MHz) on Jul 05, 2017
Copying 125kHz cards is certainly easy, as our test results showed, but how about 13.56MHz smart cards? Are they more secure? IPVM focused on the...
Biometrics Pros and Cons For Electronic Access Control on Jun 26, 2017
Biometrics has been long sought as an alternative to the security risks of cards, pins and passwords. While biometrics has improved somewhat over...
Access Control Course Winter 2018 on Jun 11, 2017
The Winter 2018 IPVM Access Control Course is now open; save $50 on early registration. IPVM offers the most comprehensive access control course...
RMR Integrator Importance Statistics on Jun 08, 2017
How do integrators feel about offering RMR / recurring revenue services? For many, their business revolves around RMR, while others see no...
HID Edge EVO Tested on Jun 07, 2017
HID Edge controllers have been one of most common offerings in IP door controllers for years. The new generation is called Edge EVO. We tested...
Access Control AHJ Nightmares on Jun 01, 2017
For access control jobs, a single person can be the difference between finishing a job, costing thousands in extra dollars, and being profitable...
US States Security Licensing Guide on May 30, 2017
In the US, many states require integrators to be licensed to install burglar alarms, CCTV, electronic access control, or all three, and...
Anti-Hack Access Card Shields Tested on May 26, 2017
Keeping your access control card information secure is becoming a big priority, especially since cheaper copiers can hack details easily. Multiple...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Smartphone Controlled Kevo Lock Tested on May 04, 2017
Smartlocks are a growing market, with millions sold. Kwikset's Kevo is one of the most common choices, using the Unikey smart phone access control...

Most Recent Industry Reports

Hikvision H.265+ Bullet Tested (2035) on Jul 24, 2017
Continuing our tests of Hikvision's new low cost Value Plus line, we bought and tested the 3MP DS-2CD2035FWD-I, now including H.265+. We shot the...
Sports Stadium Security Design Recommendations on Jul 24, 2017
Sports stadiums pose many challenges for designing security systems. The facilities vary from being mostly vacant, to packed with tens of thousands...
Competing Against Convergint on Jul 24, 2017
No integrator is more aggressively expanding than Convergint Technologies. Owned and funded by private equity firm KRG, Convergint has acquired...
Security Robots Are Just Entertainment on Jul 21, 2017
Great entertainment, no real security value.  That is the happy (or sad) state of security robots in 2017. Knightscope robot's drowning, the...
Wireless Burglar Alarm Sensors Guide on Jul 21, 2017
Wireless sensors for burglar alarm sensors are an increasingly common option for the historical labor intensive wired alarm systems. However,...
Competing Against ADT on Jul 20, 2017
ADT is one of the biggest players in the security industry, with ~$4 billion revenue. In 2017, they were acquired / merged with Protection...
Hikvision Launching Deep Learning Recorders on Jul 20, 2017
Hikvision has become a common choice for super low cost NVRs. Now, Hikvision is aiming to move up market, with deep learning NVRs that claim far...
PR Campaign Exploiting Manufacturer Cybersecurity on Jul 20, 2017
Manufacturers increasingly have a bulls-eye on their back. As cyber security solutions providers grow, they realize a great way to get publicity...
Axis Door Station Tested (A8105-E) on Jul 19, 2017
Axis continues their push into niche markets, especially audio, with network speakers, an IP horn, and video door stations. We bought and tested...
Manufacturer Favorability Guide on Jul 19, 2017
This 120 page PDF guide may be downloaded inside by all IPVM members. It includes our 20 manufacturer favorability rankings and 20 manufacturer...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact