Security is paramount to the telecommunications industry but companies face unique challenges in implementation because of the way they are structured.
Telecommunication companies are a critical part of America¡¯s infrastructure and key to securing its homeland in times of emergency. The events of 9/11 and the 2006 hurricane season emphasized the country¡¯s dependence on an effective national telecommunications infrastructure. Reliable, resilient communication services can provide the bridge between emergency responders, firefighters, and law enforcement for cohesive emergency management.
By Andy Hilverda
Security is paramount to the telecommunications industry but companies face unique challenges in implementation because of the way they are structured. Companies must secure their networks while managing hundreds of properties state-to-state over geographically widespread regions. Understanding who has access rights and when they exercise those rights is essential to securing their operations.
Cell tower site building (Photo by Videx, Inc.)
REMOTE, ISOLATED & POROUS
The on-going problems in managing remote, isolated sites are more related to vandalism and theft, than terrorism. With the tremendous increase in the price of copper and other metals, substations and equipment rooms have become prime targets for thieves. Keys are being duplicated and companies have no idea how many keys they have out in the field. Thieves gain access to equipment rooms to steal expensive network switches so they can sell them outside the United States. Cabling is stripped for the metals and sold on the open market.
There are serious access control issues for owners of rooftop antenna-site equipment rooms with multiple, co-located wireless carriers sharing the different subdivisions within a room. All have their own technicians coming and going. Maintenance people for the building¡¯s physical plant also need access rights.
In some situations, there may be a Closed Circuit Television (CCTV) system in place, or independent security cameras at the entrance to the building. However, in most cases no system has been implemented for identifying who is accessing the different subdivisions within the equipment room. Owners have no idea how many ¡°lost or missing¡± keys are still out in the field, or how many keys are being used for criminal purposes.
Remote cell tower sites face similar problems but their vulnerability is heightened by their isolation. Once again, owners often have no system in place for tracking the cell and switch technicians that visit their sites and no level of control over the keys they have issued. Another concern is that most sites include a padlock on the gate, one or two doors on the equipment room, and a door to the structure that houses the generator. Often, each type of door hardware and padlock is of a different make and manufacturer which only compounds the problem of key control.
SITE SECURITY PLAN
These are some of the troubling problems that confront companies in developing a strategy for securing their sites. As companies begin to tackle these issues, they look for an access control system that offers high-security and flexibility. Most importantly, they look for key control and an audit trail. Because they face an overwhelming array of choices, costs, and undefined benefits, they need to have a methodology in place for pursuing a balanced approach to their security goals and a way of measuring the success of their efforts.
A security plan must be scalable to allow telecom companies to control access to multiple facilities and track multiple identities. Touching lightly on some solutions that are available on the market today, here is an overview of technology that might be considered for integrating into an effective plan for managing site security.
Entry Door Systems
Entry door systems are available which use biometrics for either authentication or identification. Until recently, large biometric applications have been impractical because of the cost of replacement hardware and installation. And, a huge amount of memory is required to store biometric templates. Biometric technology is evolving with a wide array of new products for single door and stand-alone solutions. However, this technology needs to consistently provide higher read-performance in products that are being designed for commercial applications.
Digital Video Security Systems
Multi-location digital video security systems are a viable option for surveillance of rooftop antenna-site equipment rooms. As the technology has evolved, cameras are more compact and are able to produce images under limited light conditions. There are a host of products to choose from and the task of researching choices may be daunting but certainly worth looking into. When considering digital video, be aware that there are limitations to bandwidth size, and video files are extremely large. Bandwidth and file size are closely related to each other. Digital signals of the images need to be processed and transmitted over a network in a reasonable length of time. The larger the video image, the larger the bandwidth you will need to transmit the image over the network. When hundreds of cameras are installed over a large geographic area, compromises usually have to be made as to the level of image quality and the frequency of images being reproduced.
IP-based Security Solutions
Emerging technology is bringing IP-based security solutions for networked environments to provide collective surveillance, access control, and identity management to large organizations. This convergent technology incorporates IP cameras, IP video servers, video analytics, and security-explicit storage solutions. IP security should be researched thoroughly to determine the cost of all the elements including installation. Are there dedicated funds for the installation? Have administrative costs to manage the system efficiently after installation been considered? Is it the correct technology for the immediate problems being addressed?
Wireless Video Verification
Advances in technology have brought us wireless video verification. These systems combine battery-powered cameras, sensors, and GPRS radio communication with a central monitoring station. Video verified intrusion alarms are becoming more practical as the costs of CCTV have been declining, making it a more practical solution for locally-based security. Telecom site owners can benefit from a wireless system when there is an intrusion. They can quickly determine whether it is non-threatening or something more serious.
Electronic padlock on a gate (Photo by Videx, Inc.)
STAYING IN CONTROL
If key control and an audit trail is the immediate concern of most telecom companies, what¡¯s available that will enable them to get control of their keys? How can they control and audit the coming and going of subcontractors and technicians that visit their sites?
John Switzer, owner of Trevino Lock and Key in El Paso, Texas, the U.S.A., says, ¡°In working with telecom companies, I see a ¡®hodgepodge¡¯ of all types of padlocks, door hardware, and keys. Nothing is keyed the same and they have no way of quantifying their security risks because of the unknown number of keys in circulation.¡± Trevino states that companies gain control over their keys and have an efficient method of tracking their technicians and subcontractors with an electronic lock system such as CyberLock.
Verizon Wireless has widely implemented the electronic lock system throughout their facilities in the United States. Jackie Johnson, Manager of Operations for Verizon Wireless in the Carolina Region, says, ¡°We wanted better control over who entered our buildings and a system that would allow us to track key usage. With the electronic lock system, we have achieved that. Now we can track vendors completing services and other functions.¡± A subcontractor¡¯s key can be programmed to open multiple locks and padlocks. In addition, a key can be set with a period of time it will function before it becomes inactive. The electronic lock system supports a variety of methods for communication between the hardware and the software, including the use of cellular PDAs to program keys on demand in the field.
All of the solutions mentioned are certainly very capable and can be integrated into a cohesive plan for meeting telecommunications¡¯ ever-widening security concerns. By addressing security weaknesses and finding viable solutions for the day-to-day problems, companies can lessen their exposure to a terrorist attack, vandalism, and theft. With today¡¯s advances in security technology, they have the opportunity to implement integrated systems that provide physical security, accountability, and, most importantly, key control.
Andy Hilverda is Vice President of Videx, Inc. (http://www.videx.com/).
For more information, please send your e-mails to swm@infothe.com.
¨Ï2007 www.SecurityWorldMag.com. All rights reserved. |