Charlie Hebdo Forced Entrance and Access Control Measures

Author: Brian Rhodes, Published on Feb 09, 2015

Electronic Access Control usually reassures people they are safe, but a recent tragedy in France reveals a big flaw.

During the massacre at Charlie Hebdo, gunmen forced a hostage to use credentials to open a door. Once inside, they murdered 10 people. Armed Responders only arrived in force at the scene more than 30 minutes after the killers fled.

In this note, we examine two options - duress credentials and physical layering to strength access control for such risks.

********** ****** ******* ******* ********* ****** **** *** ****, *** a ****** ******* ** ****** ******* * *** ****.

****** *** ******** ** ******* *****, ****** ****** * ******* to *** *********** ** **** * ****. **** ******, **** murdered ** ******. ***** ********** **** ******* ** ***** ** the ********* **** ** ************ *** ******* ****.

** **** ****, ** ******* *** ******* - ****** *********** and ******** ******** ** ******** ****** ******* *** **** *****.

[***************]

The *****

*********, ****** ******* *** **** ****** ******** ******* ******* ******* ******* *********** ******** ** ***** *** ******* ****** ***** ** **** ******.

The *************

******** ** ******* ***** *** *** * ****** ******, *** the *********** ****** ** ******** *********** ***** ***** ******** ******. *** ******** *** * ********* ****** ******* ****** *** a ********** ******** **** ********* ** * ******. ****** **** shooting ***** *** **** *** ********, *** ****** ******* ** employee ** ** ****** *** ****** *** ** **** *** main ******** ** ********. **** *****, **** *** ******** ****** to *** ******.

****** ******* **** ***** **** *********** *** ********* *** ****** to ** *******. ** **** ****, ** ******** *** *** child **** ******* **** ***** ** ****** ***********.

** **********, *** ******** ** '**** ***** ** **** ***********?' is ***** ** ****, ********** ** ***** ******* ** * similar ****** ****** ** **** ******* *** **** ****.

What *** ** ****?

*************, ********* ****** **** *******, *** ****** ******* ** *** existing ****** ***** **** ** *** **** ***** ******** *** gunmen *** *********** ******* *** ****. **** ******** ** ******* that ***** **** **** * **********:

****** ***********: ** *** **** ** ******* * ******* ** **** doors, ** ******** ******* *** ****** ** ********* ***********, *** even ******* ** ******* *** ******** *** ** ****. ** the ***** *********, ** ******* ** **** ************ *** **** to *********. *** ****** ****** ** ****** *** **** ********* readers ** * ******* **** ** * ******* **** ** entered (**: *** ********'* *** ** ******* *****) ** ** an ******** *********** ** **** (**: *** ****-**** ***** ****** than *** *****-**** *****), *** **** ****** ****** *** ***** a ******* ********* *** ****** *** ****** ** *** ****** through **** ************ ** **** ** ****** **********.

**** ****** ** ********* ****** ** **** ****** ** '******' or '*****' *************:

******** ******:******* *** ** ****** **** ** ** **** **** **** one ********** ******* ** ********* ******. ****** ******* *************************, *********** *** ******* ******** ******** (**: ***** *****, ********, office *****) **** ********** ******* ****** *** **** ****** ** unprotected ***** *** ******** ********* ********** **** ** ********* *******.

***** ***** ** ********: ******* *** *** ******** ******** *** ********* ** ** avoid ********* *** **** ********** ** *** ******* **** ******. Rather **** '***** *** *******' *** *** ************ ** * heinous ***, *** ****** ** *** ** ******** *** **** protection ***** ******* ** ****-**** ******** *******. **** * ****** access ****** *** *** ****** ** ******** *** ***** *** Charlie *****, *** *** ***** ****** *** ******** ******** *** risk ********** ******** *** ** ******** ********** ************ ** ******* and ******** *****.

Comments (5)

***** ******* ** ***** ***** ****** ** * ******* ** the *** ******* ** ******* *** ******* **** ** *** not **** ******* ***** ******. ** * **** **** **** project ********** ****** ***** * **** ** ******** ***** **** story **** ********** *** ************ **** ******* *** *********** *******.

*** ****** ******* **** **** *** ** ******* ******** **** be **** ** *** ****** ******* *** ****** ******. ******** leading ** *********** ** ******* *** *** ****** ******. *********, duress ******** ****** ** ** *********** ** ********.

*** ****** **** ***** * ****** ** ******** **** ******? A ****** ******* ***** **** ** ******** ****** ****** *** longer ** ****, ******* **** *** ********* ******* ***** ******* about **. ** *** **** ***** *** **** ** **** other, ******** * ****** ******* ****** ***** *** ***** **** to **** ***** *** *******, *** ****** **** ***** ***** seconds, *** ** *****.

***, ** ******, *****'* *** ******* ** ******* ************ ******* alerting *** ********* **** * ************ ** ***** ****.

* ****** *** *** ** ** ***** *** **** **** give *** ****** ** ** ******** *** ****'* **** **** sending * ****** ****** ***** ****** ** ****** ****** *** loud ******.

**** *******. * ****** *** ** ******* ** **** **** to "**" ******, ** "****" ******? **** *** *** ******* different ******. ** ** *********** ** **** ** *** ***** professionals ******* ** *** ******** **** ** *** *******. **** Ellifritz ************************** ***** *********** *** **** ******** *** ******:

1) ***’* ****** ** ******* ******** ******** ** **** *** ****. The doors to the magazine’s office were locked. That didn’t matter to the terrorists. They just waited for an employee, held her hostage and told her they would kill her unless she let them in. From the ***** ****:

“‘* *** **** ** **** ** ** ******** ** *** care, ******** ** ***** ** *** ******** ********, ***** *** masked *** ***** *** ******** ********** **,’ **** ** ***….’**** said **** ****** ** ** ** ** *** *******, ** I ****** ** *** ****,’ **** ** ***, ********* ** the ****-**** ******** ****** ** *** *****-*****.”

**** ***** *** ** ** **** *********? * *** **** of *** ***** *** *** ********** ****** ** ***** ** prevent **** **** ******* *** *** **** *****. **** **** locked ***** *** *** **** *** ****** ** ***** **** Elementary (** **** * **** ******* * ****** *** *******), locked ***** ****’* **** *** ****** ****. *** ********* *** be ********** ** ********* ** **** *** ******** *********. ***’* think *** *** **** ******* *** **** ** **** ** a “******” ********.

** *** *******, *** *** ** ** **** **** *** attackers *** ******* ** ****** ** ***** ****** ***** ** switch ********* ******* ** ********* **** * ***'* ***** **** be ********** **** ***** ** * *** **** ** ***** head. ** ****** ******** ****** **** ****** **** **** ** a *********, *** * ***'* **** **** ** ** **** based ** ** *** ***********.

* ***'* **** **** *** ****** ****** **, *** * feel **** ** ** **** **** ** **** * ********** attacker **** ******, ********** ******** ********. ********* **** ***** ******* and ********* *********** ** *** ** ********, *** **** ******* magazine ****** ** *** **** *****.

******* ******************** ** ** ****** ***** *********** ******** ********** ****** is **** ** *** ******** **** **** ** ********* ** the ******** ****. *** **** ********* **** **** * **** fitings **** ***** *** ****** ** * **** **** * torpedo ******. ********* * *********** *** *** ****** ** ** to **** *** ****. * **** **** ****** ********* ** a ***** ******* ** ****. ********** *** ** *****, ****** control, *** ******* *** ******* ******** ********. ** *** ****** for * ***** ******** ******** *************, ******** *** *********/******** ********.

**** *****,

* **** **** **** ******* *** *** *** ***'* ******* how **** **** * **** **** ****** ****** ***** ****. I ** ****** ** * *** (*** ***** **) ***** concerned ** **** ****** ******.

**** ******* ** ******* *** * **** * *** ***** Duress (***** *** *** *** ********** ***** ***).

****** **** **** * ****** ** ****** * ******* ******* you **** ** ******** *** ****** *********** **** (**** *** don't *** **** *****..). **** ** **** ** *********** ******, it ** ******* ***** ****.

* -** ****** **** *** *** *** ***** **** *****.

*- ** **** ** *******, *** *** *** **** **** index (****** *******). ****'* **** ** ******** ******* * ***'* know *** **** ** ** ***** **** *** ************ ** use *** ****** ***** *** ******** ** * ***. ** this * ***** **** ***** *** ********* ******** (**** ******* exericises) ** *** *** ******* ******.

** ***** ****, ***** *** ******* ****** ** ****** ***** and ***** *** * ***% **** ***** **** *** ** the ********. * ***** ** *** *** ***** *** **********. This ***** *** * ***** *** ***** **** **** ******* prior ** ******. *** ***** **** **** ******.

**** * ****** ****** ** *********, *** ****** ********* **** a "****** *****". **** ** ** ****** ******* ***** **** to *** ******* ***** ** **** **** *** ** *** also ** ** ***** **** ** * **** ** ********** people. ** *** **** ** * *** **** ** ***********, if **********.

(**** ** *** *************: *****://***.**********.***/**/****/***)

** **** *** **** *** ***** ** *** ****** ** the ****. *** ****** ******** ** ******** *** ******* **** if ******* ******* *** ********.

***** **** ***** *** ***** ***, * ****** *** **** has *** **** *********** ... *** * **** **** ********** answers:

- ****** **** **** *** *** ************ ********* ***** (*** forget *** ***)

- ****** **** ***********. *****, ************ ******* *** ****** ********** in ****** (****). ****** ****** *** ********* ** *** *********** technology. ** * ***'* ***** **** *** ******** ***** **** accepted ***** **** "****" ****** **** *** ***** *** **** security. ******, ****** * *********** ****** ** ***** ***** ***** people *********. ******* *** ***'* **** *** ** ***** ** the *******. ****** ***** ****** ******* *** ******** ** ** confidential ** *** **** ******** ***** *** **** *** ******.

- **** ******* **** ** **** *** *** *** *************, he **** **** * ***. *** **** **** *** **** we ***** *** ******* ********* **** ****** *****. ***** ***** it.

* ***** ** **** *********** ** **** **** *** *** CCTV ****** *** ***** ** *** **** ** *** ******. If ******* *** ***********, ****** ******* ** ** **.

***** ***,

****

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Access Control

Cut in Half, Everfocus Shifts Strategies on Jan 17, 2017
The race to the bottom impact continues. Now, Everfocus, who used to be one of the larger budget providers, is shifting strategies after years of...
Introduction To Burglar Alarm Systems on Jan 04, 2017
While alarm systems are popular, balancing between the right level of protection, the appropriate components and an acceptable price can be very...
2017 Access Control Book Released on Dec 15, 2016
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing, significanlty updated for...
5th Acquisition for ACRE, Adds ComNet on Dec 14, 2016
Mercury, Siemens Security, Vanderbilt, ACT and now ComNet. While other companies are trying to get out of security, emerging conglomerate ACRE...
Access Control Integration Statistics 2016 on Dec 13, 2016
When it comes to connecting access control with other security systems, integrator survey results clearly show it is not common for most.  However,...
Secured Combo Controller - Hartmann Access on Dec 12, 2016
Typically, combo controllers are risky, because they combine sensitive door controllers with readers on the exposed unsecured side of the...
Paxton Drops US Reps, Plans Major Expansion on Dec 07, 2016
Paxton is gearing up to make a big run at  US access control success. The first step they have made is to cut all US Rep Firms, in anticipation of...
Door Operators Access Control Tutorial on Dec 05, 2016
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Free Online NFPA, IBC, and ADA Codes and Standards on Nov 29, 2016
Finding applicable codes for security work can be a costly task, with printed books and pdf downloads costing hundreds or thousands. However, a...
Solutions to 5 Common Access Control Problems on Nov 21, 2016
Effective security is more than just good equipment. In fact, thousands of dollars in electronic access control can be wasted if they are not used...

Most Recent Industry Reports

Top ISC West 2017 Booth Trends on Jan 16, 2017
There are significant moves among many major manufacturers on the ISC West show floor, and very few prime spaces left unoccupied. In this report we...
Genetec Favorability Results on Jan 16, 2017
In the race to the bottom and flight to 'solutions', Genetec has taken a contrary path. The company remains independent, focusing up market,...
Free VMS Software Directory on Jan 13, 2017
Many Video Management Software (VMS) providers offer free versions, either open source, for a limited number of cameras or for a limited amount of...
Milestone Essential Subscription Removed on Jan 12, 2017
Subscriptions may be the future for Milestone and VMSes but not right now. Responding to negative feedback, Milestone has removed subscriptions...
Alarm Reporting Formats Overview on Jan 12, 2017
Alarm reporting formats are methods for communicating complicated information quickly, using plain old telephone service. It is still the main...
Amazon Sales of Hikvision China Cameras on Jan 12, 2017
Hikvision has become widely available in the US, including on popular retail outlets like Amazon, with over 2,600 results: 4MP Hikvision outdoor...
Last Day IP Networking Course January 2017 on Jan 12, 2017
This is the only networking course designed specifically for video surveillance professionals plus it includes live training, personal help and...
ONVIF Favorability Results on Jan 11, 2017
ONVIF has been one of the most debated aspects of the video surveillance industry. On the one hand, its aim to increase interoperability has been...
Honeywell Ademco Vista Intrusion System Tested on Jan 11, 2017
One of the biggest brands in security holds one of the most common intrusion lines. We bought and tested a Honeywell Vista 15P intrusion...
ADI Battles Manufacturer Partners on Jan 11, 2017
ADI is battling their manufacturer partners, building up their own competitive house brand W-Box, while manufacturers still fund ADI's business...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact