Built-In Security

A decade ago, a truck bomb ripped the face off the Alfred P. Murrah Federal Building in Oklahoma City, killing 168 people. The Sept. 11 terrorist attacks made clear that federal buildings continue to be targets and spurred concerted efforts to design facilities to deter attacks and mitigate potential damage. Here are examples of the precautions government building managers are taking.

PERIMETER
Security checkpoints are located closer to the edge of building grounds to stop troublemakers before they get inside. The grounds often are encircled by fences, concrete posts called bollards, large flower pots and other barriers.
STANDOFF
Landscaping limits access and separates buildings from streets, sidewalks and other facilities. The General Services Administration prefers buildings to be set back at least 50 feet from the street, but urban areas often lack space.
EXTERIOR
Access to side entrances is limited to smart-card holders. Cameras keep tabs on who's coming and going. Walls are engineered to resist collapse, and if blast-resistant windows break, the shards will remain in the frame.
INTERIOR
Area cameras monitor activity. Access to sensitive computer networks is limited. Chemical and biological sensors test for suspicious particles in the air. Mailrooms are separated from buildingwide air circulation systems.
SCREENING AREA
The Federal Protective Service, which moved from GSA to the Homeland Security Department in 2003, screens visitors. FPS employs about 1,450 civil servants and 15,000 contract guards to protect 9,000 buildings.
WINDOWS
Installation of laminated glass or films over existing glass helps to limit shattering in the event of an explosion or natural disaster. Some window films also conserve energy.
CAMERAS ON GROUNDS
Hidden cameras monitor activity across the grounds and can transmit images to the control room. Footage also can be stored and monitored off-site.
LANDSCAPING
Not only beautifies grounds and obscures security devices, including cameras, but also separates buildings from traffic and limits access points.
GARAGE
Cameras can be positioned to look beneath cars and to read license plates, then transmit the images to a computer that checks the numbers to ensure vehicles are authorized to enter.
ACCESS CARD
Smart cards provide employees and contractors access to everything from entrances to computer networks. Biometric data and PINs help prevent misuse.
CONTROL ROOM
Footage from security cameras can be monitored in control rooms. Breaches, such as multiple people entering using one identification card, unattended packages or loitering, set off alarms.

NEXT STORY: Hurricane School