Department of Homeland Security Video

Department of Homeland Security Video

Take 3 minutes to listen to Bruce Davidson from Homeland Security and security professionals on the importance of SAFETY Act approved products. Isotec Security is in the anti-terrorism business. We know that offering SAFETY Act approved products removes the guesswork for our clients. They know the process and product standards set forth by Homeland Security reduce their liabilities while keeping safe and protecting what matters most. They understand that acts terrorism are rising and their countermeasures to prevent terrorism and violent crimes must prevail. Whether your facility is an airport, courthouse, hospital, place of business, or a strategic site, Isotec Security has SAFETY Act approved products that will keep safe and to protect what matters to you.

 

 

Know the Risk – Raise Your Shield: Travel Awareness

 Office of the Director of National Intelligence

Data breaches compromising personal information result in a broad range of risks to individuals. This includes identity theft, targeting of individuals with knowledge of sensitive government information and internal business processes, and other intelligence activities that use the personal information of U.S. citizens to undermine national security.

The following information is provided to help you understand how your personal information may be used by foreign intelligence services and their proxies, extremists, criminals, hackers, and other bad actors (“bad actors”); what actions to take to limit the risk of your information being exploited; and warning signs that you are being targeted.

Copy the link below to Federal Radio and paste to your browser. It will take you to a very informative and professional presentation on how to protect yourself and your confidential information when travelling. The video is sponsored by the National Counterintelligence and Security Center.

http://federalnewsradio.com/technology/2016/06/what-security-risks-do-travelers-face-abroad/slide/1/

 

 

Strategic Site Protection

Strategic Site Protection

Protecting the people who protect the President, the keepers of America’s secrets, her strategic assets, and arsenals, are Isotec’s opportunity to serve our country. Without reservation, we pride ourselves on execution and deliveries that meet all contracted site specific designs, and operational requirements. Serving the needs of our agencies is an honor and privilege. Isotec applies what we’ve learn from serving our country to our municipal and commercial projects. Call us at 300.800.3344 for more information on how we can keep safe and protect your facility.

Photos were not permitted. This project featured an X-ray station with SAFETY Act approved Access Control Portals.

 AVT-Ft. Meade-Visitor ENT-v3.1-Front ISO

SCIF & Intelligence Community Directives

TEMPEST: Telecommunications and Electrical Machinery Protected From Emissions and Spurious Transmissions

In United States security and intelligence parlance, a Sensitive Compartmented Information Facility (SCIF; pronounced “skiff”) is an enclosed area within a building that is used to process Sensitive Compartmented Information (SCI) types of classified information. SCI is classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of National Intelligence (DNI). Some entire buildings are SCIFs where all but the front foyer is secure. Access to SCIFs is normally limited to those with clearance.[1] Non-cleared personnel in SCIF must be under constant oversight to prevent unauthorized access to classified material;[2] as part of this process, non-cleared personnel are typically required to surrender recording and other electronic devices.[3] All of the activity and conversation inside is presumed restricted from public disclosure. A SCIF can also be located in an air, ground or maritime vehicle, or can be established on a temporary basis at a specific site.

The physical construction, access control, and alarming of the facility has been defined by various directives, including Director of Central Intelligence Directives (DCIDs) 1/21 and 6/9, and most recently (2011) by Intelligence Community Directive (ICD) 705, signed by the Director of National Intelligence. ICD 705 is a three page document that implements Intelligence Community Standard (ICS) 705.1. Computers operating within such a facility must conform to rules established by ICD 503. Computers and telecommunication equipment within must conform to TEMPEST emanations specification as directed by a Certified TEMPEST Technical Authority (CTTA).

SCI is usually only briefed, discussed, and stored in an accredited SCIF. Moreover, programs used for SCI are normally not acknowledged publicly by the U.S. government.

Zero risk tolerance for Physical Security of a SCIF can be accomplished a number of ways. Call us to find out how at 303.800.3344

Isotec’s Qualified Anti-terrorism Technologies protect the most secure facilities on the planet.

Intelligence Community Directive 703

Intelligence Community Standard 705-1

 

Smart Doors

Smart Doors

IMG_3391

Do you consider doors that do what you want, when you want, to be smart? How about a door system that reacts before you do? Imagine doors that are disciplined enough to protect you from harm or respond to your request in an emergency. How does this magic happen?

Smart doors are the result of aligning a series of arrayed sensors and components in constant communication with a computer know as a Programmable Logic Controller or PLC. PLCs play significant roles in our daily lives. They control stop lights, air conditioning (AKA HVAC), nuclear reactors, complex automated factories, and yes, for decades, our interlocking door systems.

PLCs don’t give operating instructions randomly. They are hard wired and pre-programmed with your operating instructions. They’ll transmit your instructions when you want and where, 24/7, every day. BTW, though done serially all this happens in the bat of an eye. We call this the “scenario of operation”.

A simple scenario of operation is “lock door A if door B is unlocked and remains unlocked”. That is a simple but fundamental act for an interlocking door system. Without that logic programmed in, both doors would be open and effectually lose “interlock’ functionality.

Doors can be programmed to work differently based on a multitude of requirements to accommodate a client’s need, and local codes. With the appropriate technologies in place, any operational requirement imaginable can be programmed into a PLC that will make the doors do what you want they and when.

Smart doors can now be controlled. Smart doors can be controlled and monitored from pretty much anywhere via web or cellular connectivity with smart phones, tablets, or dedicated wireless remotes.

Doors exist for a reason, what are yours? Do you need to protect or secure your facility, courthouse, airport, or hospital, but unsure how best to instruct and control your doors? Give us a call or send us a message. We can help.

Call us today at 303.800.3344.