Beruflich Dokumente
Kultur Dokumente
A safe and stable environment is one of the key pillars behind Singapore’s success. This will continue to be so.
The Government has invested heavily to maintain safety and security: from the efforts at our border checkpoints, to
hardening of potential targets and to building up the preparedness and resilience of our communities. While we will
continue to put in place the necessary measures and infrastructure to protect Singapore and its people, the wider
Every person, business and building owner can take a direct responsibility to ensure their own safety and security. Our
strength lies in us leveraging on the people to embrace a security mindset, both in preventing and mitigating a terrorist
The Guidelines for Enhancing Building Security in Singapore (GEBSS) is a comprehensive compilation of international
best practices in building security that can be applied to Singapore. It provides the building and construction community
with practical information and guidelines on how they can take personal action to enhance the security of their buildings.
Developers, engineers, architects and security managers will find the guidelines relevant.
A salient point made in the publication is the importance of incorporating security considerations from the very beginning
of the building design process. This way, the cost of security is greatly minimised and the architectural vision of the
building can be preserved. Indeed I think you should plan for security as the building is being designed, as it is almost
always more costly to retrofit a building to implement security measures after it has been built.
I encourage the building and construction community to study this publication and use it actively to enhance the security
of buildings in Singapore. Your efforts in doing so would be a direct and invaluable contribution to the safety and security
Page 1
(Updated as at July 2010)
The GEBSS is a ‘live’ document which will be updated when necessary. For feedback or queries, please write to
MHA_Guidelines_BuildingSecurity@mha.gov.sg.
No part of the GEBSS shall be reproduced in whole or part without prior written consent of the Ministry of Home Affairs.
Page 2
TABLE OF CONTENTS
Foreword 1
Table of Contents 3
1 Introduction To Building Security 9
1.1 The Costly Threat of Terrorism 9
1.2 Overview of the Guidelines 9
1.2.1 Background 9
1.2.2 Purpose 9
1.2.3 Assumption 10
1.2.4 Possible Threat Scenarios 10
1.2.5 Factor in Security in Building Design Early 11
1.3 Who Should Read the Guidelines 11
1.4 How to Use the Guidelines 11
1.5 Need for Security & Protective Design/Blast Consultant(s) 12
1.6 Feedback and Queries 12
2 Key Building Design Considerations 13
2.1 Introduction 13
2.2 General Architectural Considerations 13
2.2.1 Creating Stand-Off Distance 13
2.2.2 Building Orientation 14
2.2.3 Perimeter Line 14
14
2.2.5 Planning of Internal Areas 15
2.2.6 Materials/ Façade Systems 15
2.3 General Structural Considerations 15
2.3.1 Prevention of Progressive Collapse 16
2.3.2 Structural Redundancy 16
2.3.3 The Use of Detailing to Provide Structural Continuity and Ductility 16
2.3.4 Capacity for Resisting Shear Failure 16
2.3.5 Multi-storey and Underground Car Parks 16
2.4 Mechanical and Electrical System Considerations 17
3 Building and Protection Categories 18
3.1 How To Use This Chapter 18
3.2 Determining Building Category 18
3.3 Determining Building Structure category 19
3.3.1 Construction Method 19
3.3.2 Envelope Wall 20
3.3.3 Structure Category 20
4 Protection Recommendation Tables 21
4.1 How To Use This Chapter 21
4.2 Small Building/ Very Low Occupancy – Building Category S 21
4.3 Low Occupancy – Building Category L 24
4.4 Medium Occupancy – Building Category M 27
4.5 High Occupancy – Building Category H 30
4.6 Special Buildings – Building Category Y 33
5 Perimeter Design 36
5.1 Introduction 36
5.1.1 Stand-Off Distance 36
5.1.2 Perimeter line 36
5.1.3 Clear Zone 36
Page 3
5.2 How To Use This Chapter 37
5.3 Perimeter Line 37
5.3.1 Introduction 37
5.3.2 Vehicle Anti-Ramming Perimeter Line 39
5.3.2A Introduction 39
40
5.3.2C Vehicle Anti-Ramming Standards 40
5.3.2D Design of Vehicle Anti-Ramming Perimeter Line 42
5.3.2E Natural and Landscaping Barriers 42
5.3.2F Fabricated Barriers 44
5.3.3 Infrastructure Pipes 45
5.3.3A Introduction 45
5.3.3B Design of Infrastructure Pipes 45
5.3.3C Example of Design 46
5.3.4 Anti-Intrusion Fence 46
5.3.4A Introduction 46
46
5.3.4C Design of Anti-Intrusion Fence 47
5.3.4D Examples of Designs 47
5.3.5 Blast Shielding Wall 50
5.3.5A Introduction 50
51
5.3.5C Design of Blast Shielding Walls 51
5.3.5D Examples of Designs 51
5.3.6 Ballistic Perimeter Line 52
5.3.6A Introduction 52
!
52
5.3.6C Ballistic Standards 52
5.3.6D Design of Ballistic Perimeter Line 52
5.3.6E Examples of Designs 53
5.4 Vehicular and Pedestrian Entrances 53
5.4.1 Introduction 53
5.4.2 Vehicle Anti-Ramming Entrance 54
5.4.2A Introduction 54
54
5.4.2C Vehicle Anti-Ramming Standards 54
5.4.2D Design of a Vehicle Anti-Ramming Entrance 57
5.4.2E Examples of Designs 57
5.4.3 Administrative Barriers 58
5.4.3A Introduction 58
5.4.3B Design of Administrative Barrier 58
5.4.3C Examples of Designs 58
5.4.4 Protected Pedestrian Entrance 58
5.4.4A Introduction 58
58
5.4.4C Forced Entry Standards 58
5.4.4D Design of Protected Pedestrian Entrance 59
5.4.4E Examples of Designs 59
5.4.5 Delivery/Service Vehicle Access Control 60
5.4.5A Introduction 60
60
5.4.5C Vehicle Anti-Ramming Standards 61
5.4.5D Design of Delivery/Service Vehicle Access Control 63
5.4.6 Interlocking Vehicle Entrance (For higher security needs) 63
5.4.6A Introduction 63
!
63
5.4.6C Design of Interlocking Vehicle Entrance 63
5.4.6D Example of Design 64
Page 4
5.5 Security posts 64
5.5.1 Introduction 64
5.5.2 Pedestrian security posts 64
5.5.2A Introduction 64
65
5.5.2C Standards 65
5.5.2D Design of Security Posts 65
5.5.3 Vehicle Entrance Security Post 66
5.5.3A Introduction 66
5.5.3B Design of Vehicle Entrance Security Post 66
5.6 Landscaping 66
5.6.1 Introduction 66
!
66
5.6.3 Design of Landscaping 66
5.6.4 Example of Design 67
5.7 Security Lighting 67
5.7.1 Introduction 67
5.7.2 Security Lighting - Perimeter Line and Entrances 67
5.7.2A Introduction 67
"
68
5.7.2C Illumination Standards 69
5.7.2D Design of Security Lighting 69
5.8 Positioning of car parks and critical utilities 69
5.8.1 Introduction 69
5.8.2 Positioning of Car Parks 70
5.8.2A Introduction 70
5.8.2B Design of Car Parks 70
5.8.3 Positioning of Critical Utilities 70
5.8.3A Introduction 70
5.8.3B Design of critical utilities 70
6 Building Façades 71
6.1 How To Use This Chapter 71
!
# 71
!$
71
6.2.2 Standards for Blast Resistance 72
6.2.3 Standards for Forced-Entry Resistance 72
6.2.4 Standards for Ballistic Resistance 72
6.3 Building Walls 73
6.3.1 Introduction 73
6.3.2 Pre-Cast Load Bearing Walls 73
6.3.3 Non-Load Bearing Wall Panels 74
6.3.4 Light Walls 75
6.4 Curtain Walls 75
6.4.1 Introduction 75
6.4.2 Fully Framed Glass Curtain Walls 76
6.4.3 Point Supported or Other Curtain Wall Systems 76
6.4.4 Stone or Metal Finished Light Walls 77
6.5 Windows 78
6.5.1 Introduction 78
6.5.2 Blast Protected Windows 78
6.5.3 Ballistic Protected Windows 80
6.5.4 Forced Entry Protected Windows 83
6.5.5 Combined Protection of Windows 84
6.6 Doors
6.6.1 Introduction 84
6.6.2 Blast Protected Doors 85
6.6.3 Ballistic Protected Doors 85
6.6.4 Forced Entry Protected Doors 86
6.6.5 Combined Protection For Doors 87
Page 5
7 Building Structure 88
7.1 Introduction 88
"
88
7.3 Design Criteria 88
7.3.1 The Blast Load 88
7.3.2 General Guidelines 89
7.4 Progressive Collapse Prevention 89
7.4.1 The Systematic Approach 89
7.4.2 The Localised Approach 90
7.4.3 Column Protection 90
7.4.4 Wall Protection 92
7.4.5 Beam Protection 93
7.4.6 Slab Protection 94
8 Security Systems 95
8.1 How To Use This Chapter 95
8.2 Security Control Room 96
8.2.1 Introduction 96
%
96
8.2.3 Design of a Security Control Room 96
8.3 Intercom and Communication System 98
8.3.1 Introduction 98
%
98
8.3.3 Design of an Intercom and Communication System 98
8.3.4 Examples of Designs 98
8.4 Public Address System 99
8.4.1 Introduction 99
%
99
8.4.3 Design of a Public Address System 99
8.5 Alarm System 99
8.5.1 Introduction 99
%
100
8.5.3 Design of an Alarm System 100
8.5.4 Examples 101
8.6 Access Control System 102
8.6.1 Introduction 102
%!
103
8.6.3 Design of An Access Control System 103
8.6.4 Examples of Design 103
8.7 CCTV System 103
8.7.1 Introduction 103
%"
104
8.7.3 Design Considerations 104
8.7.4 Installation & Operation 105
8.7.5 Essential Support 106
%"!
'*+,
0
990#: 107
8.7.7 References 107
8.8 Security Lighting for CCTV systems 107
8.8.1 Introduction 108
%%
108
8.8.3 Standards 108
8.8.4 Design of Security Lighting 108
8.8.5 Example 109
Page 6
9 Special Attention Areas 110
9.1 How To Use This Chapter 110
9.2 Parking 110
9.2.1 Introduction 110
<
111
9.2.3 Design of a Car Park 111
9.2.4 Example 111
9.3 Pedestrian Entry Areas 111
9.3.1 Introduction 111
<
112
9.3.3 Design of Pedestrian Entry Areas 112
9.3.4 Examples of Designs 112
9.4 Loading Docks 113
9.4.1 Introduction 113
<
113
9.4.3 Design of a Loading Dock 113
9.4.4 Example of Design 113
9.5 Garbage and Waste Disposal Dock 114
9.5.1 Introduction 114
9.5.2 Design of Garbage and Waste Disposal Areas 114
9.6 Mail and Delivery Room 114
9.6.1 Introduction 114
<!
114
9.6.3 Design of Mail and Delivery Rooms 114
9.6.4 Examples of Designs 114
9.7 VIP Holding Room 115
9.7.1 Introduction 115
9.7.2 Design of VIP Holding Rooms 115
9.7.3 Example of Design 115
9.8 Protected Rooms 115
9.8.1 Introduction 115
<%
115
9.8.3 Design of Protected Rooms 115
9.9 Central Utility Rooms 116
9.9.1 Introduction 116
9.9.2 Design of Central Utility Rooms 116
9.9.3 Example 116
9.10 Air-conditioning System 116
9.10.1 Introduction 116
<$>
116
9.10.3 Design of an Air-Conditioning System 117
9.11 Water Supply and Tanks 117
9.11.1 Introduction 117
<$$
117
9.11.3 Design of Water Supply and Tanks 117
Page 7
Appendix A
Sample of Security and Safety Design Requirements for Buildings: For Tendering Purposes 118
1 Engagement & Scope of Security and Protective Design/Blast Consultant(s) 118
2 Assessment Process 118
3 Security and Protective Design Plan Submission Stages 119
4 Site Planning and Design Considerations for Crime Prevention 119
5 Site Planning and Design Considerations for Vehicular Threats 119
6 Site Planning and Design Considerations for Parking 120
7 Site Planning and Design Considerations for External Circulation 120
8 Architecture and Interior Design 120
9 Structural Design 121
10 Mechanical Design 123
11 Electrical Design 123
12 Chemical, Biological & Radiological Protective Measures 124
Appendix B
General Security Guidelines for Hotels 125
Introduction 125
Security Rings 125
1 Deterrence 125
2 Pro-active Security 126
3 Perimeter Security 126
4 Access Control 127
5 Security Command & Control Rooms 129
6 Emergency Plans & Procedures 130
Concluding Remarks 130
Appendix C
General Security Guidelines for Shopping Malls 131
Introduction 131
The Security Concept 131
Security Rings 132
1 Deterrence 132
2 Pro-active Security 133
3 Perimeter Security 133
4 Access Control 134
5 Security Command & Control Rooms 135
6 Emergency Plans & Procedures 136
Concluding Remarks 137
Page 8
1 INTRODUCTION TO BUILDING SECURITY
Page 9
1.2.3 ASSUMPTION
These guidelines are based on the common assumption are aimed at mitigating the casualty level. Full implementation
that comprehensive protection against every possible threat is of these guidelines will provide reasonable protection against
cost prohibitive. The philosophy introduced in these guidelines is terrorist threats.
that appropriate protection can be provided for new development
projects either at a reasonable cost or at no additional cost. As most building developments nowadays are designed
Building designs that employ factors to eliminate or limit the to house large concentrations of people, a reasonable level of
possibility of an attack help reduce the need to employ hardening protection for the large numbers of people who visit the area
*
J**
@
^*,q, must be provided. In general, the design and operation of these
areas. When the possibility of an attack cannot be eliminated buildings should not aggravate the likelihood of mass casualties
or limited, the guidelines will supply recommendations that among the visitors in the event of a terrorist attack.
The threats as illustrated in Table 1 : Possible Terrorist- the different threat scenarios that are likely to be executed at
Related Threats, are derived from the adversary’s ideology, locations throughout the development that are assessed to be
capability and modus operandi, and have been used to determine vulnerable.
Page 11
Diagram 1 : Illustration on the process for selecting the These guidelines address the following issues:
relevant building and protection categories and
Protection Recommendation Table (PRT):
J
,
:@, *q ^,
@ @
including the perimeter line, landscaping and the structural scheme
itself;
Page 12
2 KEY BUILDING DESIGN CONSIDERATIONS
2.1 INTRODUCTION
The project concept as well as the design and planning cases, incorporating this notion into the building design
stages of the building development are key milestones to considerations will provide a better secured facility at no additional
incorporate security considerations into the architectural layout, cost.
the structural aspects as well as the mechanical and electrical Stand-off refers to the distance from the building to a potential
systems of the building development. At the project concept threat and not the distance from the building to the perimeter of
stage, key issues to be considered include but are not limited the lot (although in many cases the two align). This requires a
to site selection and location, the building type, dimensions, preliminary assessment of the current and foreseeable threats.
positioning and orientation within the lot, landscaping as well as
@ ^J,
J design and planning stage, The blast load is characterised by an overpressure shock wave,
important deliberations include but are not limited to the structural which rapidly expands as a hemispherical pressure wave from
scheme, characteristics of the envelop walls and facades, the source of the explosion. The nature of the shock pressure is
,
@
a sudden rise of pressure and rapid exponential decay, followed
congregation areas. by a longer and smaller negative phase.
Relating to physical security issues during the initial An explosive charge detonating very close to the structure
J*,
@
J
[ imposes a very high impulse and very high, intense pressure
effective way to achieve the required security level at minimal over a local area.
cost. Studies have demonstrated that the implementation of
security elements at the preliminary design stage according to For example, if the lot has a public road that runs along
J
*,
,:J
^,, it, the building positioning should try to maximise the distance
@
@
J
,q
,:@, between the road and the structure or areas where people gather
for protection of the facility, by relating to the security aspects (Figure 1: Stand-off distance).
early on, architects and planners will be able to blend the
required protection elements into the design of the facility thereby
ensuring a minimum aesthetic impact. This could also assist the
architect to avoid any compromise in his vision or design of the
facility in favour of security elements. Such compromises are
typically sources of tension between the architect and the security
planners if security aspects are only considered at a later stage of
the project.
The orientation of the building and its elevations may With a large vehicle population in a dense urban
* J
J *J q,
^
J,,*J@,
By taking advantage of the horizontal and vertical angles development. The security requirements for limiting entry and
and obscuring the lines of sight from a potential threat, the access control must be balanced with the need to meet standard
*
@
:q*
,:
*,
*@@
J
@
^
Raising the ‘ground level’ as high as possible over the public accessibility to the building and parking areas. These issues,
areas will also increase the stand-off distance. Positioning the and in particular the location for current or future access control
building at an angle in the lot (Figure 2 & Figure 3), or opposite points, must be factored in at an early stage in order to meet the
a natural retaining wall may also reduce its vulnerability. The *:
* ` J
*, q
J
nature of the surrounding landscaping and obstacles between the
J
@
J *:
explosive device and the buildings will also affect the loading on aspect as well as the convenience of the users of the facility.
the buildings.
J
`@@
J
*,,
take into account the need for vehicle screening and consider
factors such as the number of screening bays, the type of
screening measures and the average time taken to screen each
vehicle.
*,J
*,J^,,[
@J:,@
line separating secure and non-secure areas as it is the last
obstacle preventing a vehicle from approaching within dangerous
proximity of the building.
Page 14
2.2.5 PLANNING OF INTERNAL AREAS
Many facilities are characterised by the presence of large The internal positioning of the various functional areas
J
@
@,@
^*JJq*,J JJJ,*
J
Jq,:
areas of mass congregation are considered highly attractive for protect them. For example, areas that hold high crowd densities
terrorists and therefore should be given special consideration should be positioned away from high risk areas such as envelope
during the design stage. As crowd concentrations behind large ,,,
9,@,
glass façades in public areas are exposed to a great risk, it is rooms should be positioned at the core of the building or in
therefore not recommended to use exposed façades as the main specially protected areas. The areas that should be considered
light source opposite public areas. This, however, does not apply include:
to internal façades which are not exposed to threat scenarios.
Building materials are a critical issue when protecting 2.3 GENERAL STRUCTURAL
a facility. Different materials have different hazard levels and CONSIDERATIONS
require different protection methods. The main categories to be
considered are: An explosive charge detonating very close to the building
imposes a very high impulse and very high, intense pressure over
a local area. This tends to shatter the structural materials or to
cause them to shear. At greater distances, the peak pressure is
@,:
,:**
J|@
,:q*
a larger area of the structure will be affected and more structural
members will be exposed to the overpressure. The load on the
building will appear as concentric rings of different load intensities.
^
,,@
J@
,,
,
failure from element to element, eventually resulting in the
collapse of an entire structure or a disproportionately large part
of it.
Page 15
2.3.2 STRUCTURAL REDUNDANCY
The ability of the structure, façade or object to resist The use of redundant lateral and vertical force resisting
blast pressure given all the above parameters is a function of the systems is highly encouraged in order to overcome forces
material composition of the structure, and the section properties imposed by the blast and transfer loads from locally damaged
of the main structural elements, the structural spans and the structural elements. Redundancy tends to promote a more
connection details. These structural design guidelines should be robust structure and helps to ensure that alternate load paths
considered during the initial structural design phase to minimise are available in the case of the failure of structural elements.
J @
J q*,
, J
@
Additionally, redundancy provides multiple locations for yielding
these features will provide a much more robust structure and to occur, which increases the probability that damage may be
increase the probability of achieving a low potential for progressive constrained.
collapse.
2.3.3 THE USE OF DETAILING TO PROVIDE
During the design and planning stage, the public façade STRUCTURAL CONTINUITY AND DUCTILITY
should have a simple structural scheme consisting of a beam/
column system or even pre-fabricated load bearing panels. Arising It is critical that the primary structural elements be
from the studies of the Oklahoma City attack, it is recommended capable of spanning two full spans (i.e., two full bays). This
that placing large transfer beams carrying the façade opposite requires beam-to-beam structural continuity across the missing
public areas that are accessible by vehicles be avoided. It is
,* ,, J |*,
q,:
q
J @:
recommended that internal primary structural elements be placed and secondary elements to exceed their elastic limit without
behind the public façade, which acts as a form of shielding. experiencing structural collapse.
2.3.1 PREVENTION OF PROGRESSIVE COLLAPSE 2.3.4 CAPACITY FOR RESISTING SHEAR FAILURE
^
,,@
J@
, It is essential that the primary structural elements
local failure from element to element, eventually resulting in the *
J*,:*q
,,
collapse of an entire structure or a disproportionately large part event to preclude a shear failure such as in the case of a structural
of it. Progressive collapse occurs, for example, when the loss of element failure. When the shear capacity is reached before the
one column results in the collapse of a disproportionate portion of |*,@:J@
q,:
*
[*, ,*
the building. This was illustrated in the bombing of the Alfred P. the element exists, which could potentially lead to a progressive
Murrah building in Oklahoma City on 19 Apr 1995. The majority of collapse of the structure.
the 168 fatalities were due to the partial collapse of the structure
rather than the result of the direct blast effects.
2.3.5 MULTI-STOREY AND UNDERGROUND CAR PARKS
Page 16
2.4 MECHANICAL AND ELECTRICAL
SYSTEM CONSIDERATIONS
Given that the rationale behind these guidelines is
to have all the security requirements for a new development
project incorporated into the general design, security
considerations for mechanical and electrical systems should
also be considered at an early stage. Compatibility and
integration with the general design in the initial stage will help
achieve an effective assimilation of systems to the design.
#*J
,, ,
@^
q J
system requirements and other factors such as the urban
@,,@,J
:
Page 17
3 BUILDING AND PROTECTION CATEGORIES
In order to identify the security recommendations for any given The Protection Recommendation Tables have been
building, this chapter should be used in the following way (as divided into four general categories and these relate to the
illustrated in Diagram 2): MAJOR protective role of each of the elements that appear in
the table, i.e. what are the main phenomena each element is
supposed to prevent. Most of these elements have additional
I. Determine building category.J:@,,:
q: roles which can be found in Chapter 5 to Chapter 9 that describe
q
J
Jq*,@*@
+
each element’s proper application and design.
example, a one story museum that hosts a relatively small number
@
@, @ J
* ,, q
J^ ,
*@: The major protective roles referred to in the Protection
and a large 25 storey crowded hospital building hosting many Recommendation Tables (PRT) are:
J
*
@
@,
*,q,,q
J^
JJ
*@:+^
J^q
J +
:+J
@
^
,,:
details and selection criteria can be seen below in Section 3.2. penetrate perimeter lines, doors, windows or walls.
II. Determine building structure category. This is determined
^9
,,@9J
J@
by the proposed construction method and the types of façade/ an initial local failure from element to element, eventually resulting
envelope wall. For more details regarding the structure and in the collapse of an entire structure or a disproportionately large
façade/envelope wall categories, refer to Section 3.3. It is highly part of it.
advisable to consider more than one construction method in order
@
^|q,:*J +
+ J
,
,,
projectiles that are hurled or shot at a building or its interior (e.g.
III. Review the relevant Protection Recommendation Table bullets, primary and secondary fragmentation, etc).
(PRT) (Chapter 4). For each building category, a protection
recommendation table lists all the structure categories and the #@,
# J
J
different possible protection elements. By reading the table, it is @^
*J`
,
@
Jq*
possible to determine which elements are recommended for each that may be subject to threats due to their special characteristics
structure category. or their sensitive role in the building’s operation during routine
or emergencies (e.g. control room, loading dock, ballrooms, VIP
IV. Look up the details for each protection element (Chapter rooms, etc).
4). For each item in the protection recommendation table, a
detailed description on its technical requirements is provided.
2
In order to reduce the protective burden, risk management is
used. It is highly recommended for the stakeholders to understand
the alternatives as it may be desirable to adopt a higher level of
protection, especially when the incremental costs are minimal.
Page 19
3.3.3 STRUCTURE CATEGORY
Structural engineers are advised to take the protection
,
J**
JJ*
on the overall structure category (see Table 5). If the appropriate In this section, the construction method and the envelope
construction method cannot be clearly selected from the above walls are combined in a table to represent a structure category for
table, it is recommended to choose one level down the list (with any given building.
‘1’ being the weakest type of construction and ‘4’ the strongest).
In other words, when in doubt, always choose a category which Once the structure category has been established, the
will result in a stricter or more comprehensive protection solution. design and construction team can then review the Protection
Recommendation Tables (PRT) for the proposed building category
3.3.2 ENVELOPE WALL
J@
@
the building.
The building’s envelope wall plays a major part in the
^,,@
@q,
Jq*,`J
,
The way that the tables are constructed allow the
@
q,,
,,
@ architect and structural engineers to see the trade-offs in the
forced entry and many other crime and terror related threats. The design methods and the costs related to special protection
building envelope’s materials and construction also determine the elements like perimeter wall, windows, doors, parking area
extent of fragmentation in the event of a blast. and more. For example, by selecting a perimeter wall of 20cm
concrete with small windows rather than a light brick wall with
From the security point of view, the more desirable ,
J@
,^,q
,:
envelope wall would be constructed of reinforced concrete (with with very little effect on the budget.
or without cladding) and include small, protected windows. This
type of wall requires a minimum of security design but is usually Table 5: Building Structure Categories
not the type of wall favoured by architects. If any other envelope
wall is considered, the architect should consider the protection
requirements for each wall system before deciding on any Structure Pre cast
In-situ
Pre-cast load column,
proposed system. This is even more important for façades that column &
bearing walls beams &
Steel
face open public areas. It is strongly recommended to consider beam
slabs
J
,*
q
,
Envelope
There are protection solutions for almost every type of façade, Walls
1 2 3 4
q*J
,@
*J
,*
:q
J::
q,:^,q,J Curtain
A 1A 2A 3A 4A
walls
For protection purposes, envelope walls fall broadly into
Large
one of four categories: windows B 1B 2B 3B 4B
above 25%
Table 4: Envelope Walls Medium
windows C 1C 2C 3C 4C
10% - 25%
Small
windows less D 1D 2D 3D 4D
than 10%
Page 20
4 PROTECTION RECOMMENDATION TABLES
The aim of the Protection Recommendation Tables All the design options relevant to the same building
(PRT) are to give the architect and the design team the list of category are listed in the same table. Within the table, the columns
protection elements and recommended materials to be included represent the items relevant to each building structure category
in the design of the building. This may be used as a general (construction method + envelope walls). The protection elements
guide, and in conjunction with the Threat Vulnerability and are listed in each row of the table only by name. To learn more
Risk Assessment (TVRA) conducted for the building, which will q
*J@
J@
,
J@
@
, please refer to the detailed technical information in Chapter 5 to
Chapter 9.
The PRTs divide the different protective elements into
*@
J @,
J @
element’s major role in the protection of the building. It is
important to note that the different elements usually have more 4.2 SMALL BUILDING/ VERY LOW
than one role. Each structure type (combination of construction
method and façade material/ design) that appears in the Structure OCCUPANCY – BUILDING CATEGORY S
Category table will have different protection requirements.
J q, q,
J @
*
To use the Protection Recommendation Tables (PRT): for small buildings or buildings with a very low occupancy that
serve as commercial, residential or any other use. By very low
I. Select the Building Category from Table 2: Building (S, L, M, occupancy, it is assumed that the building has one or two storeys
H, Y) (Section 3.2). and contains no more then 10 people in it at any one time. It
is therefore assumed that the building requires only minimal
II. Select the Building Structure Category from Table 5: Building protection and security since its risk level can be considered
Structure Categories (A1, A2…. D3, D4) (Section 3.3.3) having low. Despite the low occupancy, if the design team considers the
J
*
J
q,9
*
building to be particularly threatened for whatever reason, it may
Methods) (Section 3.3.1) and envelope walls (Table 4: Envelope choose to relate to a higher category (L or M) with the associated
Walls) (Section 3.3.2). higher level of protection.
III. Go to the Protection Recommendation Table for the selected To use the table below:
building category and identify the column for the selected building
structure category. I. In each row of the table, a protection element is listed.
IV. The rows in the table for the selected building structure category II. Find the column that represents the desired buidling structure
determine the protection elements that are recommended or category (a combination of construction method and envelope
required. ,,,#
III. Look down the column and wherever indicated with the symbol
For each building category, a separate Protection ‘+’, the protection element for that row should be included in the
Recommendation Table appears in this chapter: design.
IV. Combining all the protection elements indicated will form the
recommended protection envelope for the building.
Page 21
Table 6: Small building / very low occupancy – Building Category S
Page 22
NOTE:
In this PRT table (Category S), there are critical protection elements that are HIGHLY RECOMMENDED to be included in the
building’s design. In this case, it is highly recommended to design every building to incorporate the items highlighted in the above
table in RED/BOLD.
Page 23
4.3 LOW OCCUPANCY – BUILDING
CATEGORY L
Jq,q,
J@
q*, II. Find the column that represents the desired buidling structure
with a low occupancy. By low occupancy it is assumed that the category (a combination of construction method and envelope
density of people in the building is less than one person per 30 m2 walls as detailed in Section 3.3).
on average or less than 100 people in a relatively large building
(for example each room in the building holds an average of only III. Look down the column and wherever indicated with the
one person at a time). Despite the low occupancy, if the design symbol ‘+’, the protection element for that row should be included
team considers the building to be particularly threatened for in the design.
whatever reason, it may choose to relate to a higher category (M
or H) with the associated higher level of protection. IV. Combining all the protection elements indicated will form the
recommended protection envelope for the building.
To use the table below:
For more details on each of the protection
I. In each row of the table, a protection element is listed. recommendations, refer to the relevant section in Chapter 5 to
Chapter 9.
Page 24
Page 25
NOTE:
In this PRT table (Category L) there are critical protection elements that are HIGHLY RECOMMENDED to be included in the
building’s design. In this case, it is highly recommended to design every building to incorporate the items highlighted in the above
table in RED/BOLD.
Page 26
4.4 MEDIUM OCCUPANCY – BUILDING
CATEGORY M
Jq,q,
J@
q*, III. Look down the column and wherever indicated with the
with a medium occupancy. By medium occupancy it is assumed symbol ‘+’, the protection element for that row should be included
that the density of people in the building is less than one person in the design.
per 10 m2 and more than 1 person per 30 m2 on average, or less
then 1000 people in total. If the design team believes that more IV. Combining all the protection elements indicated will form the
than 250 people will congregate in a single area of the building at recommended protection envelope for the building.
any time, it is recommended to select a higher category of H with
the associated higher level of protection. For more details on each of the protection
recommendations, refer to the relevant section in Chapter 5 to
To use the table below: Chapter 9.
II. Find the column that represents the desired buidling structure
category (a combination of construction method and envelope
walls as detailed in Section 3.3).
Page 27
Page 28
NOTE:
In this PRT table (Category M) there are critical protection elements that are HIGHLY RECOMMENDED to be included in the
building’s design. In this case, it is highly recommended to design every building to incorporate the items highlighted in the above
table in RED/BOLD.
Page 29
4.5 HIGH OCCUPANCY – BUILDING
CATEGORY H
III.Look down the column and wherever indicated with the symbol
The table below is meant for buildings with a high ‘+’, the protection element for that row should be included in the
occupancy. By high occupancy, it is assumed that there are more design.
than 1000 people in the building and/or more than 1 person to
every 10 m2
^J
::q*
@
IV. Combining all the protection elements indicated will form the
lower occupancy locations which would otherwise be assigned recommended protection envelope for the building.
Category M or L but may require a higher level of protection.
For more details on each of the protection
To use the table below: recommendations, refer to the relevant section in Chapter 5 to
Chapter 9.
I. In each row of the table, a protection element is listed.
II. Find the column that represents the desired buidling structure
category (a combination of construction method and envelope
walls as detailed in Section 3.3).
Page 30
Page 31
NOTE:
In this PRT table (Category H) there are critical protection elements that are HIGHLY RECOMMENDED to be included in the
building’s design. In this case, it is highly recommended to design every building to incorporate the items highlighted in the above
table in RED/BOLD.
Page 32
4.6 SPECIAL BUILDINGS – BUILDING
CATEGORY Y
The table below is meant for special or symbolic To use the table below:
buildings. The concept of ‘special’ relates to the need for special
security and this category is relevant for buildings that are at high I. In each row of the table, a protection element is listed.
J*
J*JJJ@
,
J@
@,J
their symbolic nature. For example, Parliament House requires II. Find the column that represents the desired buidling structure
@
,
[ @
q
category (a combination of construction method and envelope
terms of the ratio of people per square metre. walls as detailed in Section 3.3).
It is common practice for special or symbolic buildings III. Look down the column and wherever indicated with the symbol
to have a unique architectural design. In order to ensure that ‘+’, the protection element for that row should be included in the
the building’s overall design incorporates the required level of design.
protection without compromising the aesthetic aspect or the
architect’s vision, it is important for the design team to include IV. Combining all the protection elements indicated will form the
a protective design/blast consultant. The guidelines in the table recommended protection envelope for the building.
below are intended to provide the basic protection concept for a
high security facility and should allow a budget to be derived. For more details on each of the protection
recommendations, refer to the relevant section in Chapter 5 to
Chapter 9.
Page 33
Page 34
NOTE:
In this PRT table (Category Y), all protection elements are critical and it is highly recommended to include them in the building design.
Page 35
5 PERIMETER DESIGN
This chapter discusses the positioning of a building Unimpeded access to the buildings and open spaces in
within the lot and the protection elements between the building’s a lot constitutes a risk, and may enable the perpetration of most
envelope walls and the boundary line of the lot. The chapter will threats close to the critical elements of a building or to areas
consider two scenarios: with large crowd concentrations. Perimeter line protection can
assist by preventing a threat or intruder from approaching the
I. Where the building’s envelope wall itself forms the boundary building envelope walls and openings and populated areas of the
line. building. By adding protection elements on the perimeter line,
the risks and threats from every building category are reduced.
II. Where there is an open area between the building’s envelope This is especially important to the more vulnerable building types
walls and the boundary line. such as those with envelope wall type A (glass curtain walls) or
structure type 1 (pre-cast columns and beams).
This chapter provides conceptual solutions for integrating
perimeter line designs, landscape architecture (vegetation,
landforms, and water) and site planning. 5.1.3 CLEAR ZONE
Page 36
When determining the site landscape and perimeter line, The following protection elements appear in this chapter:
designers should consider the following factors:
Access via foot, road, rail, water, and air and the implications of
access on the ability to maintain a secure perimeter.
Lines of sight from beyond the site boundaries and the ability
of vegetation in proximity to the building or site to screen covert
activity.
Page 37
A physical perimeter line is a means of establishing ,J
*J
*,
JJ q*,
a controlled access area around a building or asset. Physical would be at risk from a terrorist-related attack, building owners
q,@q*
J@J:, should adopt a prudent approach. For example, most buildings
limits of a building and can help to restrict, channel, or impede will require basic perimeter line measures such as establishing
access and create a continuous barrier around the site. Physical a vehicle anti-ramming line and infrastructure pipes. Other
barriers are also a deterrent for anyone planning to penetrate the measures such as anti-intrusion fences, blast shielding walls and
site and as such, they should either delay or prevent access. The establishing a ballistic perimeter line would be for buildings that
types of barriers selected can have a direct impact on the number have been assessed to require higher levels of security.
and type of security posts that may be needed to ensure site
security. The objective of this section is to provide a basic understanding
of perimeter defence issues. This will enable architects to
As explained in the following sections, there are a make decisions about the types of fence, wall or line necessary
number of solutions to the creation of a physical barrier including for any building, based on knowledge and understanding of
various types of fences, barriers, walls, bollards, planters, the relevant design points and building’s characteristics as
concrete barriers, grade level differences and trees. The described previously in Chapter 3. The sections will discuss the
selection of barrier elements must take into account the level of various protection levels to be achieved and describe various
desired security based on the threat levels (e.g. in the case of a architectural possibilities and design considerations for each of
vehicle, the various approach speeds). The leading factors that these categories.
must be taken into account when deciding on the type of physical
barrier solution are the urban landscape design, architectural
requirement and the threat level to be countered. The various
,*
^,q, **,,: q,
, @J:,
architectural considerations.
Page 38
5.3.2 VEHICLE ANTI-RAMMING PERIMETER LINE
5.3.2A INTRODUCTION
Page 39
5.3.2B TERMS AND DEFINITIONS
Table 11A: Impact Standard SD-STD-02.01 Issued by the
US Department of State
Page 40
Table 11B: Corresponding Standards for SD-STD-02.01, ASTM F2656-07 and PAS68:2007
* This data was extracted from ‘Table 1: Impact Condition Designations’ of the ASTM F2656-07 document, titled ‘Standard Test
Method for Vehicle Crash Testing of Perimeter Barriers’.
Notes:
+ q*#!%>>"J@ J *, q J$' qJ *, q
Page 41
5.3.2D DESIGN OF VEHICLE ANTI-RAMMING VEGETATION
PERIMETER LINE
In general, the anti-ramming barrier line should be Vegetation along a perimeter line can be used to deter
continuous and should completely surround the site. Any intruders from approaching the building. The vegetation is
locations where an unscreened vehicle could possibly approach required to act as an obstacle preventing the direct approach of
or enter the site should be analysed and eliminated, including vehicles. Trees with a trunk diameter larger than 50 cm can be
neighbouring plots and open areas around the site. Factors to be used to stop a vehicle, depending on the protection level required.
considered in the design of a vehicle anti-ramming perimeter line However, thick vegetation is not advised as weapons and
are: Improvised Explosive Devices (IEDs) hidden in dense plantings
in close proximity to a building may not be easily detectable.
I. The approach speed of a potential vehicle approaching the Fabricated perimeter barriers capable of stopping moving
perimeter line is a design criterion which should be considered vehicles can be integrated with vegetation such as shrubs, trees
at the initial design stage when planning the access roads to or other plants for aesthetics purposes to hide or soften the
J ` q,
:
* J @ *
appearance of the security elements.
q,:
,@
,
J*
lower the required protection level of the barriers. The feasibility of employing vegetation as a natural and
,@ q ,,: @
J @
q,
II. The edge-to-edge distance between discontinuous barriers between plant growth and the presence of underground utilities.
such as bollards, or trees with a trunk diameter larger than 50cm, As large plants and trees grow, their root systems may affect
should be no more than 120cm. If the barriers are tapered, the subsurface conditions and undermine both utilities and the well-
edge-to-edge distance should be measured at mid-height. Any being of the plant. Close collaboration between the security and
decorative coverings should be ignored in determining the edge- protective design/blast consultant(s) and landscape designers is
to-edge distance. critical to create an aesthetic landscape design in which plantings,
light distribution, pedestrian circulation and surveillance work
III.The minimum height of the barrier should be 65 cm from the together. This collaboration should also include a plan for the
ground. care and maintenance of the landscape.
IV.The mass and foundation of the barrier are major factors in its
ability to stop vehicles. The barrier foundation for a typical anti-
ramming barrier is required to be approximately 60 cm deep and
should always be designed according to prevailing soil conditions.
There are also designs available for anti-ramming barriers to suit
shallow foundations.
Terrain features such as retaining walls, natural steps, As long as the inner core comprises a proper steel
or large rocks may provide effective barriers to vehicles. Grade pole able to withstand the impact according to the standard,
level differences can also be built in to the landscape design as the covering can be decorative and can match any architectural
another form of barrier. design (bollards located in the city centre should also comply with
URA’s requirements). Bollards used as part of a vehicle anti-
ramming perimeter line should minimally meet the SD-STD-02.01
5.3.2F FABRICATED BARRIERS K4 standard or the equivalent ASTM F2656-07 or PAS68:2007
There are a wide variety of options for fabricated vehicle standard.
barriers. The following are a few examples:
PLANTER
Page 44
HARDENED STREETSCAPE ITEMS 5.3.3 INFRASTRUCTURE PIPES
Standards
There are no internationally recognised security standards that
are relevant to the protection of sewage or drainage access
pipes.
Page 45
5.3.4 ANTI-INTRUSION FENCE
VI. Drainage ditches, culverts, vents, ducts, and other 5.3.4A INTRODUCTION
openings that pass through a perimeter and which are greater
A pedestrian anti-intrusion perimeter line is designed
than 25 cm in diameter should be protected by securely fastened
to prevent unauthorised persons from entering the site and
welded bar grilles. The addition of grilles or pipes to culverts or
approaching the building. It is also possible to combine this line
other drainage structures must be coordinated with the engineers
with other protection elements in order to prevent the ramming of
J J J
@: q
@
vehicles. This section will relate only to fences.
additional maintenance resulting from the installation can be
taken into account.
An intrusion of a person can be stealthy and silent or
forced and noisy. The ranges of possible threats include:
VII. Manhole covers 25 cm or more in diameter must be
secured to prevent unauthorised opening. They may be secured
A suicide bomber carrying an explosive device.
with locks and hasps, by welding them shut, or by bolting them to
An intrusion in order to plant an explosive device.
their frame.
A start of an assailant attack.
An intrusion for sabotage / theft.
Page 46
5.3.4C DESIGN OF ANTI-INTRUSION FENCE
The following factors should be considered in the design
J
*,[@*@
@
,*
of an anti-intrusion fence: is hollow 4 mm 5 X 5 cm. The distance between bars should
be no greater than 10 cm. Due to the weight of the fence and
I. The fence should be designed to meet the required level of the desired heavy duty performance, it is particularly important to
protection across all its component parts. This includes not plan the pole foundation properly.
only the fence itself but also the footing (to prevent anyone from
digging under), the corners, and connection to structures.
The fence can be produced with or without the top part
II. The minimum height required for an anti-intrusion fence is 250 angled outward but it is important to make sure that no element
cm. of the fence design or location will allow an intruder to use it as
@ q*, J J @
, ^ ,:
III.Vegetation, light poles or similar objects near the fence line, single intruder or blocking a mob. For certain designs of the base
should be designed in such a way as to prevent them from
*
q:*J^,@
,:,
@
assisting an intruder to scale the fence. a ramming car. As stated previously, combining fence types can
J^ *@
@
@
J
J J
IV.The line should be planned in such a way as to prevent or fence type can be fully upgraded to a smart fence.
,:*
*
J*:
@
to arrive.
A hardened welded chain link fence has a relatively long This wall is effective for stopping different kinds of
life compared to other simpler fences and is recommended in intrusions or a mob and the fence can be upgraded to a smart
most cases. It is possible to upgrade this fence to a smart fence fence.
by combining it with detectors.
Page 48
FENCE OPTIONS SMART FENCES
Page 49
5.3.5 BLAST SHIELDING WALL
5.3.5A INTRODUCTION
The purpose of a blast shielding wall is to reduce the load For example, at a given standoff distance and threat
levels on areas of the building’s structural elements and external level, the expected load on the building is an impulse of 1,300
façade as a result of an explosion. A blast shielding wall is often @,,[J,,,
,:*J
used when it is not possible to establish an acceptable stand-off loads to an impulse of under 100 psi*msec. This would allow for
distance between a potential blast and the target building, and a wide variety of standard design solutions of building elements
when the hardening of the structural elements and the façades is instead of specially-designed elements with high resistance to
*
q,,,J,,,:,,
blast loads.
the architects and engineers to use building methods, materials
and products (walls and windows) that would otherwise not be *, J
J *,, @* $>>
feasible. psi levels striking unprotected buildings can be reduced to 50 psi
at ground level. The extent of pressure reduction will depend on
Reducing loads on the building walls is achieved by two means: the height of the wall in relation to the height of the building, and
the distance between the wall and the building.
` J q, ^ @@,
J ,, :
J
building.
II. Creating a “shadowed” area that will reduce the loads on the
building.
Page 50
5.3.5B TERMS AND DEFINITIONS
IV. The wall may be constructed of any material (sand, earth,
water) as long as the 3 points above are observed.
VI. The distance of the blast shielding wall from the protected
building wall should not exceed 15 metres.
Standards
There are no internationally recognised security
standards for blast shielding walls or their performance. This
is mainly due to the fact that there are so many parameters
involved in a blast against a wall. The selection of the wall type
depends on:
``
|,,,,*^
*
q
@
@
soil investigations.
Page 51
5.3.6B TERMS AND DEFINITIONS
5.3.6A INTRODUCTION
I. All components of the fence or partition should be designed
A ballistic perimeter line prevents a shooting incident to meet the required level of protection. This includes both the
from outside. This line can be combined with other elements to panel and the connectors.
prevent both intrusion and the ramming of vehicles. This section
relates to locations where exterior ballistic protection is required. II. If there are external areas which overlook the parts of the
Areas that may be considered for ballistic protection include facility which require protection, the protection will have to be
|@
JJ
,J J
,
example).
III.Every effort should be made to prevent a direct line of sight
The two concepts usually employed for preventing from the exterior into the building. This usually does not serve as
shooting assaults from outside are as follows: ballistic protection but might eliminate or at least limit the threat.
Blocking the line of sight can be achieved either by decorative or
A physical barrier to stop the penetration of a projectile. standard fencing, or by landscaping and vegetation.
Page 52
5.3.6E EXAMPLES OF DESIGNS
Figure 35: A glass ballistic partition Figure 36: A steel ballistic partition
Page 53
PEDESTRIAN ENTRANCES
If possible, the entry point should be at a location as far as In such cases, it would be more effective to install two separate
possible from the building or facility itself. gates at the entrance for vehicles and pedestrians.
The entrance should be designed in such a way as to 5.4.2B TERMS AND DEFINITIONS
contain an attack and prevent it from progressing towards the
protected facility.
#*
@J
*,q,,
@
@@
for communication (which may be at a distance) between the
people entering and those responsible for approving access.
5.4.2A INTRODUCTION
A vehicle anti-ramming entrance is used to prevent
unauthorised vehicles from entering the premises. A combination
of elements may be used to also prevent the intrusion of
pedestrians.
5
Please refer to ASTM’s website to obtain the ASTM F2656-07
‘Standard test method for crash testing of perimeter barriers’
(http://www.astm.org/Standards/F2656.htm).
6
Please refer to BSI’s website to obtain the PAS 68:2007
#@
^J, *: q (http://www.shop.
bsigroup.com/en/ProductDetail/?pid=000000000030135101).
Page 55
Table 12B: Corresponding Standards for SD-STD-02.01,
ASTM F2656-07 and PAS68:2007
* This data was extracted from ‘Table 1: Impact Condition Designations’ of the ASTM F2656-07 document, titled ‘Standard Test
Method for Vehicle Crash Testing of Perimeter Barriers’.
Notes:
+ q*#!%>>"J@ J *, q J$' qJ *, q
Page 57
RETRACTABLE BOLLARDS 5.4.4 PROTECTED PEDESTRIAN ENTRANCE
Automatic retractable bollards provide protection from
5.4.4A INTRODUCTION
vehicles but not from pedestrians. They are useful because
of their relatively fast operation cycles and can therefore be A forced entry gate prevents unauthorised people from
@,JJJ
^J,
entering the premises. Intruders may seek to gain entry to a
building with either criminal or terrorist intentions. In the case
Retractable bollards which meet anti-ramming standards of terrorist attacks, the entrance itself is often where the attacks
would typically require a relatively deep foundation, and so need have taken place, particularly when there is some form of security
to be located suitably. in place there.
It is recommended to have the bollards installed together When considering the pedestrian entrances at the initial planning
with a light arm barrier for visibility and safety reasons. stage of a new development project, the aims should be to:
Standards
There are no internationally recognised security standards that
are relevant for administrative barriers. 5.4.4C FORCED ENTRY STANDARDS
J
J
[@
^
Page 58
The following international standards are recommended for use XI. Where an interlocking system is required, it should be
in Singapore: implemented at entrances and exits.
II. A portal at the entrance should be built to the same XVII. Preparation for the installation or deployment of
protection standard as the building envelope. screening equipment should be considered, and this should
include the following:
III. The gate should prevent anyone from breaking through
as well as climbing over or under. Space for a walk-through metal detector and an x-ray
machine.
IV. Waiting areas may need to be assigned both on the J
,qJ
*,
*
,
qJ
exterior side (pre-security screening) and on the interior side equipment (mentioned above).
(post-security screening). Suitable electricity infrastructure.
Suitable post for the guard performing the screening.
V. The different security requirements for during and after
J
*J
*,q
XVIII. For effective screening, proper lighting is required.
5.4.5A INTRODUCTION
Page 60
7
5.4.5C VEHICLE ANTI-RAMMING STANDARDS Please refer to ASTM’s website to obtain the ASTM F2656-07
‘Standard test method for crash testing of perimeter barriers’
The guidelines for vehicle anti-ramming here are based (http://www.astm.org/Standards/F2656.htm).
on the SD-STD-02.01 standard issued by the U.S. Department
of State, Bureau of Diplomatic Security which is commonly used 8
Please refer to BSI’s website to obtain the PAS 68:2007
worldwide for anti-ramming barriers and walls and the UK BSI #@
^J, *: q J@J
@
PAS68:2007 issued by UK British Standards Institute. The SD- bsigroup.com/en/ProductDetail/?pid=000000000030135101).
STD-02.01 standard considers various threat levels in the form of
vehicles weighing 6,800kg ramming the barrier at various speeds
and is aimed at preventing a vehicle ramming into the barrier
from penetrating more than 1 metre past the barrier line. As of
1 Feb 2009, SD-STD-02.01 was replaced by ASTM F2656-07.
Both ASTM F2656-07 and PAS68:2007 allow for different vehicle
types (e.g. from passenger cars to very heavy trucks) ramming at
@
@@
Page 61
Table 13B: Corresponding Standards for SD-STD-02.01,
ASTM F2656-07 and PAS68:2007
* This data was extracted from ‘Table 1: Impact Condition Designations’ of the ASTM F2656-07 document, titled ‘Standard Test
Method for Vehicle Crash Testing of Perimeter Barriers’.
Notes:
+ q*#!%>>"J@ J *, q J$' qJ *, q
XII. The security screening method should be discussed at I. When one of the barrier lines also forms part of the perimeter
an early stage to ensure it can be implemented. The delivery fence, it is recommended that the sliding gate be the light barrier
/ service entrance area will almost always have some form of (i.e. non-anti-ramming). This ensures quicker operation and is
security check / registering and a proper guard post should also more commercially viable.
be established. Preparation for the installation or deployment
of screening equipment should be considered. This could II. It is preferable to establish the second barrier as the anti-
include screening machinery, underground pits, extra lighting, ramming line.
underground cameras etc. all of which will require electricity
outlets and space. III.The interlocking system is required at both entrances and
exits.
XIII. Proposed screening equipment should be based on the
ability to discover threat devices according to the relevant threat IV. It is recommended to have both barriers operated by the same
level (e.g. if the relevant threat to the loading bay is a large bomb system controller.
hidden in one of the deliveries, a screening system searching the
bottom of the vehicle will not be effective). V. The area between the barriers should be used as the security
screening point and preferably should be outside the perimeter
line. Every attempt should be made to avoid locating this area
under populated or vulnerable parts of the building.
Page 63
VI. If there is no choice but to locate the screening area under 5.5 SECURITY POSTS
parts of the building, the whole area must be strengthened in
such a way as to contain any possible attack that could take place
5.5.1 INTRODUCTION
there.
Security posts are built when there is a security need to
VII. Even if procedures at normal threat levels do not require man a static location on the building’s perimeter line or at critical
an interlocking entrance, it is recommended to try to allocate positions for long periods of time. The security post is meant to
necessary space in case such a procedure is required in the enhance the ability of the security guard to perform his duties by
future for higher threat levels. being well positioned and well equipped regardless of the weather
or light conditions. It can also be used to improve his survivability
VIII. The distance between the two barrier lines should take into in case of an attack aimed at breaching the building’s perimeter.
consideration the maximum vehicle size of potential users of the
entrance (delivery trucks/ private vehicles). The actual distance Security posts can be designed and built as part of the
should be at least 150% of the size of the largest vehicle expected development or can in certain situations, be bought as a ready-
to enter. made product when only a small booth is required (usually at
vehicle entrances).
IX. The entrance should be designed in such a way as to prevent
a vehicle from bypassing the second line once it has been allowed The security posts will usually combine the ability to
J
*JJ
, perform pro-active security and monitoring both physically and
using security systems.
X. Preparation for the installation or deployment of screening
equipment should be considered. This could include catering for
5.5.2 PEDESTRIAN SECURITY POSTS
electrical outlets and space.
5.5.2A INTRODUCTION
XI. For effective screening, proper lighting is required.
As seen in Section 5.4.4 a pedestrian entrance can be one of
the most vulnerable and critical locations within a site because it
5.4.6D EXAMPLE OF DESIGN
performs three main functions:
Access control.
Security screening.
Page 64
5.5.2B TERMS AND DEFINITIONS BALLISTIC RESISTANCE STANDARDS
5.5.2C STANDARDS
Due to the fact that the guard post is usually on the front line,
it is almost impossible to provide it with full protection due to its
proximity to the potential threat. Therefore it is recommended to
use medium level as standard.
5.5.2D DESIGN OF SECURITY POSTS
The following factors should be considered in the design
of a security post:
FORCED ENTRY STANDARDS II. Where necessary, the observation of the area under
responsibility should be augmented by proper lighting and
A standard level of forced entry is determined according cameras.
to the following three criteria:
III. Blind spots should be prevented and backed up by CCTV
The accessibility of the area to a potential intruder both in monitoring or mirrors if they cannot be avoided.
terms of the length of time that an intruder can stand and work
to gain entry without being disturbed, and in terms of physical IV. No critical controls for the building security systems should
accessibility. be placed in the perimeter or entrance security post. Exceptions
can be made only if the security post has an adequate protection
The importance of the site. level.
J
J
[@
^ V. The systems in the security post should be fail-safe to ensure
the site remains sealed if the post is breached. If the post is not in
an area secured from the potential threat in the exterior side, the
The following international standards are recommended for use line between the security post and the inner side of the building
in Singapore: should be protected to prevent any potential problem moving into
the building.
VI. The entrance to the security post should be from the inner
area and not from the outside.
Page 65
5.5.3 VEHICLE ENTRANCE SECURITY POST 5.6 LANDSCAPING
5.5.3A INTRODUCTION
5.6.1 INTRODUCTION
A vehicle entrance is one of the most vulnerable and The clear zone is the area between the buildings and
critical locations within a site. For that reason, designing an the perimeter line. Unrestricted visibility is required in order to
effective security post at this point has a major effect on the future ensure that no approach will be unnoticed and package-sized
protection level provided to the site. As the vehicle entrance point objects cannot be abandoned without detection. A clear zone
is usually on or close to the building lot line, design mistakes are can be achieved by using a combination of civil and architectural
^:
*,
@,,: [
elements with exterior landscaping.
achieved. Vehicle entrance security booths are in common use in
a wide range of developments. They typically perform three main
tasks: 5.6.2 TERMS AND DEFINITIONS
Access control.
Security screening.
VI. The entrance to the vehicle security post should be from the
inner area and not from the outside.
Page 66
5.6.4 EXAMPLE OF DESIGN 5.7.2 SECURITY LIGHTING - PERIMETER LINE AND
ENTRANCES
5.7.2A INTRODUCTION
5.7.1 INTRODUCTION
Page 67
5.7.2B TERMS AND DEFINITIONS
Page 68
5.7.2C ILLUMINATION STANDARDS ENTRANCES
The recommended standards are based on the US DOT I. All vehicle and pedestrian entrances to the facility should have
standards FTA-TRI-MA-267085-05 and DOT-VNTSC-FTA-05-02. appropriate lighting.
II. Lighting at manned entrances must be adequate to identify
people, examine credentials, inspect vehicles entering or
departing the facility premises through designated control points
(vehicle interiors should be clearly lit), and prevent anyone from
entering unobserved into the premises.
Page 69
This section will focus on two main areas whose
5.8.3 POSITIONING OF CRITICAL UTILITIES
positioning is particularly sensitive:
Car parks
Critical Utilities 5.8.3A INTRODUCTION
,::*
J*q
5.8.2 POSITIONING OF CAR PARKS the shock of an explosion. Some of these utilities may be critical
for safely evacuating people from the building or to the emergency
5.8.2A INTRODUCTION response to an attack. Their destruction could cause damage
that is disproportionate to other building damage resulting from
Car parks constitute a relatively simple opportunity to |@,
|@,
*,qJ
q
*
introduce large quantities of explosives to a building’s vicinity *,
|@,
J
*
J
|*J
or to its sensitive and vulnerable areas. Limiting or restricting or smoke ventilation systems not functioning can be much higher
parking can help to keep threats away from a building, however than the direct results of the explosion.
in dense urban environments such as Singapore, parking spaces
in close proximity to the building, and underground parking are
common. Mitigating the risks caused by parking in close proximity 5.8.3B DESIGN OF CRITICAL UTILITIES
can be achieved by creative design measures, including parking
regimes, perimeter buffer zones, barriers, structural hardening The following factors should be considered in the design
and other architectural and engineering solutions. Operational of critical utilities:
measures may also be necessary to inspect or screen vehicles
entering car parks. I. Plan the utilities to be underground, concealed, and protected.
I. Vehicle parking areas should be as far as possible from the IV. Locate the main fuel storage away from areas that can be
building’s highly populated areas. easily accessed.
II. Parking areas should be separated by at least 20 meters 0,,
*,J
q
,,::
q
from utility rooms, utility mains and service entrances, including from the outside of the building thereby limiting the need for
,, ,@J
, :
service vehicles to enter.
suppression water mains, cooling and heating mains, etc.
VI. Locate garbage containers as far away from the building as
III.Parking under the building is not recommended but if possible.
unavoidable, the building should be hardened for blast and if
vehicle access close to major structural elements is unavoidable, VII. Conceal incoming utility systems within building and property
the major structural elements must be protected against blast. lines.
IV. The design of the car park should limit damage to adjacent VIII. Route critical or fragile utilities so that they are not on exterior
areas and vent explosive forces to the exterior of the building. walls or on walls shared with mailrooms, loading docks etc.
V. If possible, separate resident and visitor parking and locate To limit opportunities for aggressors to place explosives
visitor or general public parking near, but not on, the site itself. underneath buildings, ensure that access to crawl spaces, utility
tunnels, and other means of under building access is controlled.
VI. If possible, design the parking lot with one-way circulation. All utility penetrations of a site’s perimeter barrier, including
penetrations in fences, walls, or other perimeter structures,
VII. Prohibit parking within the stand-off zone based on the ability should be sealed or secured to eliminate openings large enough
of the structure and its materials to withstand a potential threat. for an intruder to pass through the barrier. Typical penetrations
could be for storm sewers, water, electricity, or other site utility
VIII. Provide parking lots with adequate lighting and with CCTV services.
cameras connected to the security system.
Page 70
6 BUILDING FAÇADES
This chapter describes construction methods, solutions The following protection elements appear in this chapter:
and protection elements relating to the building’s envelope
including façades and openings. The façades at the building’s
envelope walls are the main protection against most criminal and
terror related threats including silent or forced entry, shootings
and explosions.
Standards
Every wall or protection element mentioned in Chapter
6 must minimally meet the relevant building codes and
internationally recognised standards: 6.2 DEFINITIONS AND STANDARDS
Blast resistance 6.2.1 DEFINITIONS
Forced entry
Ballistic resistance
Page 71
6.2.2 STANDARDS FOR BLAST RESISTANCE
Blast Resistance
Page 72
6.3 BUILDING WALLS
6.3.1 INTRODUCTION
Envelope walls have many architectural and functional
roles in the building and in some cases they form the main
structural support. In this section, the protection roles of the
building envelope walls and the need for the addition of special
protection elements will be discussed. The objective of this
chapter is to provide basic protection design guidelines to enable
architects to make decisions about the type of doors, windows,
envelope walls and building materials to use for any given building
or facility. To fully understand the security and protection role of
J^,
@,,
read the General Architectural Considerations in Section 2.2.
INTRODUCTION
Standards
All relevant Singapore building codes and standards must
be followed. If there is a contradiction between these
guidelines and the building code, the latter should prevail.
Page 73
In general, the standard pre-cast load bearing walls DESIGN OF NON-LOAD BEARING WALL PANELS
which are commonly used in the building industry in Singapore
provide relatively high resistance to blast loads. A typical vehicle-
borne IED (VBIED) at a distance of approximately 10m from the Standards
building will create an impulse of 500 psi*msec. At this level, the All relevant Singapore building codes and standards must
wall itself will be severely damaged but is expected to continue be followed. If there is a contradiction between these
to support the vertical loads of the building. The recommended guidelines and the building code, the latter should prevail.
general design criteria for pre-cast load bearing walls should
include the following:
In general, the standard pre-cast walls which are commonly
I. Blast resistance. The pre-cast load bearing wall must be used in the building industry in Singapore provide relatively
able to withstand a full range of expected blast loads and should high resistance to blast loads. A typical VBIED at a distance of
preferably exceed the expected parameters. Among the many approximately 10m from the building will create an impulse of
aspects to consider, the structural engineer must design the 500 psi*msec. At this level, the wall may be destroyed, but the
steel reinforcement and concrete characteristic according to the **J*J^J,,
:
causing secondary fragments of concrete and building materials
@
@
J
JJ |@
due to the blast leakage. The recommended general design
act on the wall in an explosive event. A professional protective criteria for pre-cast non-load bearing wall panels should include
design/blast consultant/engineer may be essential if there are the following:
special requirements.
I. Blast resistance. The pre-cast load bearing wall must
II. Forced entry. If the connection details and the section be able to withstand a full range of expected blast loads and
properties are planned correctly, a pre-cast load bearing wall can should preferably exceed the expected parameters. Among the
withstand a high level of forced entry. A professional protective many aspects to consider, the structural engineer must design
design/blast consultant/engineer may be essential if there are the steel reinforcement and concrete characteristic according to
special requirements. The most sensitive parts of the wall are J@
@
J
JJ|@
the openings for windows, doors and utilities where the required act on the wall in an explosive event. A professional protective
level of forced entry protection must be ensured. design/blast consultant/engineer may be essential if there are
special requirements.
III. Ballistic Resistance. 10 cm of concrete can very easily
withstand bullets and other projectiles but close attention must be II. Forced entry. If the connection details and the section
given to the connection details for doors, windows, and adjacent properties are planned correctly, a pre-cast load bearing wall can
walls to ensure that they offer the same level of protection. withstand a high level of forced entry. A professional protective
design/blast consultant/engineer may be essential if there are
special requirements. The most sensitive parts of the wall are
EXAMPLE OF DESIGNS
the openings for windows, doors and utilities where the required
level of forced entry protection must be ensured.
EXAMPLE OF DESIGNS
INTRODUCTION
Page 74
6.3.4 LIGHT WALLS EXAMPLE OF DESIGNS
INTRODUCTION
Light walls or light metal walls are used mainly for
*,
q*,
,
JJ
are sensitive to vertical loads and may not be able to support
more solid structures. They can also be used as internal light
metal walls placed behind external curtain walls which would not
otherwise provide the necessary level of protection (See Section
6.4 for more information). The protection capabilities of light walls
are limited in the following ways:
Standards
All relevant Singapore building codes and standards must
be followed. If there is a contradiction between these
guidelines and the building code, the latter should prevail.
II. Forced entry. Custom designed walls can meet the full range of 6.4 CURTAIN WALLS
forced entry requirements.
6.4.1 INTRODUCTION
III. Ballistic resistance. Custom designed walls can meet the full
range of resistance requirements to bullets and other projectiles. Curtain walls are used very frequently in modern
architectural design. In this section, the protection roles of
curtain walls and the need for the addition of special protection
elements will be discussed. The objective of this chapter is to
provide basic protection design guidelines to enable architects to
make decisions about which doors, windows, envelope walls and
building materials to use for any given facility, based on knowledge
and understanding of the relevant design considerations and
the building’s characteristics as described in Chapter 3. To fully
understand the security and protection role of the envelope walls,
J,
Architectural Considerations in Section 2.2. The main protection
and security roles of the curtain walls, windows and doors are:
Page 75
Concealing the activity inside the building from external Protection is further enhanced if the bite of the curtain
intelligence gathering or targeting. wall frames is increased in order to retain the “binding” of the
laminated glass together with structural silicone sealant is used to
Preventing fragments of building material from hitting people adhere the laminated glass to the frame. In all cases, the overlap
inside the building. between the glass and its frame should be as large as possible.
The minimal size of the bite should be 20mm. This attention to
In general it is recommended to use fully framed curtain the size of the bite and the sealant attachment will prevent the
walls which, when designed in accordance with these guidelines, J
,,
:
will provide basic protection to occupants of the building. The use becoming a large projectile.
@
,,,
,:*J
casualty level in the case of a terror attack involving explosives The laminated inner glass must be glued to the framing
or forced entry. Point supported curtain walls and other curtain members with a four sided structural silicone adhesive, preferably
wall systems are not as desirable as a fully framed curtain wall, a two-part “shop glazed’ application of structural silicone. This will
due to the concentration of loads on the elements providing the enable the PVB membrane to act as a blast shield and prevent
support. If however, a point supported curtain wall is to be used, JJ
*,
:
J
Jq*,
applying laminated glazing and a catcher system to it will reduce It will also prevent the glazing from detaching from the frames and
the casualty level. allow the system to fully realise the energy absorbing capacity of
the glass.
6.4.2 FULLY FRAMED GLASS CURTAIN WALLS
Applying these recommendations will provide a basic
INTRODUCTION level of protection.
DESIGN OF FULLY FRAMED GLASS CURTAIN WALLS 6.4.3 POINT SUPPORTED OR OTHER CURTAIN WALL
SYSTEMS
The following factors should be considered in the design
of fully framed glass curtain walls:
INTRODUCTION
The ability to resist loads is a function of the connection Glass facades which are not fully framed are attached
to the supporting frame and the type of glazing. Annealed glass to the building structure with metal hangers that are connected
can resist minimal blast pressure whereas heat-strengthened to the glass by point supports. These systems provide relatively
glass, fully tempered glass and laminated glass can resist larger poor protection. Point supported systems are not capable of
pressure loads. The post-damage behaviour of glass determines withstanding high blast pressure loads. The supports concentrate
the hazard to the occupants. Unlike annealed glass, fully tempered the blast forces at the four corners of the glazing and as a result,
glass breaks into pebble sized pieces. Laminated glass has one there are large stress concentrations in the glass corner supports.
Instead of absorbing energy (by bending), the components of
of the most desirable post-damage behaviour with its ability to
point supported systems can turn into large projectiles with high
hold the fragments in place after the glass fractures. The most energy. These types of glass facades do not provide a high level
effective protective glazing utilises laminated glass, connected of protection against forced entry and in order to achieve higher
to the mullions with structural silicone sealant. Insulated glazing protection levels, special designs and glass systems must be
panels (thermo-panels) can be very effective if interior laminated used.
,*
|
J*,,
J*,,J
structural silicone sealant. In this case, it is recommended that Where a higher level of protection is needed, secondary
the laminated glazing be made out of heat strengthened glass. protection systems can also be added to the glass façade to
J J
@, J
* @
, enhance the protection levels without touching the original curtain
element, but testing has proven that the external glass adds to wall.
the protection level of the glazing.
Standards
All relevant Singapore building codes and standards must
be followed. If there is a contradiction between these
guidelines and the building code, the latter should prevail.
Page 76
DESIGN OF POINT SUPPORTED CURTAIN WALL DESIGN OF STONE OR METAL FINISHED LIGHT WALLS
SYSTEMS
The following factors should be considered in the design
The following factors should be considered in the design
,
J,J,,
of point supported curtain wall systems:
In the event of an explosion, protected façades will
In general, it is not recommended to use point supported probably transfer part of the attack’s force into the building’s
curtain walls due to their limited resistance to blast loads. structure. This transferred force must be calculated and
considered when designing the structure. Some products will
Where a higher level of protection is needed, a secondary transfer more energy than others and their performance under
protection system should be added to the glass façade. This may extreme conditions must be proven by the manufacturer in
be in the form of a catcher system. test conditions or by calculation. The failure mechanism of the
protection element must be provided to the design team and
studied in order to ensure that it will not cause more damage than
Standards an unprotected façade.
All relevant Singapore building codes and standards must
be followed. If there is a contradiction between these
guidelines and the building code, the latter should prevail. Standards
All relevant Singapore building codes and standards must
be followed. If there is a contradiction between these
EXAMPLE OF DESIGNS guidelines and the building code, the latter should prevail.
EXAMPLE OF DESIGN
INTRODUCTION
Transparent or decorative walls, constructed of light
,
:
J,J
J
*
buildings. These wall systems are relatively weak and provide
little protection against most threats including blast or forced entry.
There are two major ways to enhance its protection capabilities:
Page 77
6.5 WINDOWS
Protective windows and glazing should be considered for
6.5.1 INTRODUCTION all exterior windows where blast overpressures may produce a
Windows are used in every building for light and J
*
`*:q*
:q
occasionally for ventilation. However, they are normally a weak and from exposure to direct blast pressures. In general, basic
point in the protection envelope of the building. The building protection should be applied:
industry has recognised the problem and there are many
available products that can meet the required protection levels. +
J
J
JJ
The objective of this chapter is to provide basic protection design
guidelines to enable architects to make decisions about which To windows in the building’s facades which are not subject to
windows and building materials to use for any given building or the threat.
facility. In order to understand the security and protection role of
J
#
To windows in internal courtyards.
INTRODUCTION
STANDARDS FOR GLAZING HAZARD PROTECTION
There are many commercially available windows which
meet different protective levels. Only windows which have The U.S. General Services Administration (GSA) blast
q* *,,:@@
^q:
,,q
: protection criteria have been adopted by the Interagency
should be used. The test report must be attached to the detailed Security Committee (ISC) and are the most widely recognised
installation drawings enabling installation and supervision in line ,
,^,
,J@
with the testing method. Without clear and approved construction table below).
drawings, it is impossible to validate the installation of the protected
windows. Although most of the blast protected commercial
|
q
@
case of emergency. It is recommended to place the windows
which can be opened (whether they be protected or unprotected)
in less populated areas.
Page 78
Table15: GSA/ISC Performance Conditions for Window System Response
DESIGN OF BLAST-PROTECTED WINDOWS Annealed glass can resist minimal blast pressure
whereas heat-strengthened glass, fully tempered glass and
laminated glass can resist larger pressure loads. The post damage
The ability to resist loads is a function of: behaviour of glass determines the hazard to the occupants.
Unlike annealed glass, fully tempered glass breaks into pebble
The connection of the window to the supporting frame. sized pieces. Laminated glass, which includes an interlayer of
The connection of the glazing to the frame of the window. [J[
,#+:@,,:@
,:^:,q*:,0JJ
The type of glazing. most desirable post-damage behaviour with its ability to hold the
fragments in place after the glass fractures. The most effective
Standards protective glazing utilises laminated glass, which is adhered to
The U.S. General Services Administration (GSA) blast the frame of the window with structural silicone sealant. Insulated
protection criteria have been adopted by the Interagency glazing panels (thermo-panels) can be very effective if interior
Security Committee (ISC) and are the most widely ,,*
|
J
J
!
with structural silicone sealant. In this case, it is recommended
that the laminated glazing will be made out of heat strengthened
!
glass. With thermo panels, the outer pane is considered a
Refer to Chapter 6.2 for Details.
,,q*J@
^JJ|,,
adds to the protection level of the glazing.
The supporting frame can be a reinforced concrete wall
element or equivalent. The window frame can be constructed
from materials including aluminium, HPVC, steel or others. If a Protection is further enhanced if the bite of the curtain wall
window is to be opened, the ability to transfer loads from the frame frames is increased in order to retain the “binding” of laminated
of the window to the supporting frame of the building depends on glass together with structural silicone sealant is used to adhere
the locking mechanism. In most commercial windows, the ability the laminated glass to the frame. This attention to the size of the
of the locking mechanism to resist blast loads is very limited. bite and the sealant attachment will prevent the entire sheet of
,,
: q
,
projectile. The minimal recommended bite is 20mm.
Page 79
The laminated inner glass must be glued to the framing
members with a four sided structural silicone adhesive, preferably
a two-part “shop glazed’ application of structural silicone or
*^,J,,q,J[J[
,
J,
glass to act as a blast shield and prevent the shattered outer
,
:
J
Jq*,`,,,
@^
the glazing from detaching from the frames and allow the system
to fully realise the energy absorbing capacity of the glass.
EXAMPLES OF DESIGNS
INTRODUCTION
Standards
The European EN standard should be used.
Refer to Chapter 6.2.4 for details.
EXAMPLES OF DESIGNS
GUIDE SPECIFICATION
GLASS-CLAD POLYCARBONATE
APPLICABLE STANDARDS
#'9$<[>##@
J*,+,
Glass Clad Polycarbonate.
#'9$>![>!##@
+,,
#*:
Glass Association of North America Glazing Manual.
Compliance with standards for bullet-resistant windows, doors Glass Association of North America Sealant Manual.
JJ@@
@
Page 81
Page 82
6.5.4 FORCED ENTRY PROTECTED WINDOWS
Standards
The US Department of State 12-FAH-5 standard or the
European standard ENV 1630: 1999 should be used.
Refer Chapter 6.2.3 for details.
'
,
|J
JJ
be opened are usually designed for maintenance or emergency
| ` ,
*
|
:
protected windows where the relevant connection details are
limited to one frame only. Where a window opens, it usually
includes two frames – one frame for the glazing and one frame
for the connection to the supporting element. While tilt, tilt/turn
or sliding windows are available, such windows will only meet the
protective criteria when the windows are closed and fully locked.
Page 83
DESIGN CRITERIA
See the relevant sections in each of the protected window types:
EXAMPLES OF DESIGNS
INTRODUCTION
Page 84
Standards EXAMPLES OF VALID DESIGNS
All relevant Singapore building codes and standards must
be followed. If there is a contradiction between these
guidelines and the building code, the latter should prevail.
Contradictions between the security guidelines and safety
standards can usually be resolved, For example, an external
door with a panic device which is used for evacuation can
serve also as a forced entry protected door by means of a
magnetic lock system.
INTRODUCTION
Page 85
In many cases ballistic protected doors should also be and its supporting frame. Without approved construction drawings,
blast protected. It is important to check that the ballistic door will which include clear details of the protected connections, it will not
:J*q
JJq,,
be possible to validate the installation of the protected doors as
an equivalent product to the tested sample.
DESIGN OF BALLISTIC PROTECTED DOORS
The protected door must be supplied by the manufacturer DESIGN OF FORCED ENTRY PROTECTED DOORS
with the complete instructions for installing it in the designated
wall. The protective components of the forced entry doors
J
*, q @@
^ q:
,q
: J
The protective components of the ballistic door should most common material used to provide forced entry resistance
q @@
^ q:
,q
: J
in doors is steel which is extensively used in the plates, ribs and
commonly used protective material in ballistic doors is steel frame. The strength of the connection between the door panel
@, J @
* ,*
J , and the supporting frame is achieved by the locking mechanism.
and the frame to ensure that the identical products are installed in J@
*,*
J,
@
the site. Ballistic protected doors with glazing should be treated and the locking mechanism.
like ballistic protected windows.
Ballistic doors can be used as an integral part of a Standards
curtain wall or a pre-fabricated wall system but in general it is All relevant Singapore building codes and standards must
recommended to use them as part of a pre-fabricated concrete be followed. If there is a contradiction between these
panel. The connection detail between ballistic protected doors guidelines and the building code, the latter should prevail.
and a reinforced concrete opening is relatively simple, with
minimal gaps/holes. The connection detail to structural steel
frames is also straight forward but the connection detail to a +
:
,q
,** * ,,
*, ,
q:@
,JJ@
,*,
recommended. and electric). For every protection level there is different set of
tools and time limits by which the technicians have to open a
EXAMPLE OF DESIGN window of a predetermined size. The difference in the standards
referred to in Section 6.2 is that the US DOS standard is based
on a manual set of tools (mainly against the attack of a massive
unorganized mob) whereas the EN standards are based on the
use of electric tools assuming a smaller and more organized
group attempting forced and silent entry. The project team must
make the decision on the standard that is more suitable for the
building in question.
Page 86
EXAMPLES OF DESIGNS DESIGN CRITERIA
Rigid polystyrene
foam blocs
2/16” (3 mm) EXAMPLES OF DESIGNS
thick plate
INTRODUCTION
Page 87
7 BUILDING STRUCTURE
7.1 INTRODUCTION
Page 88
7.4.1 THE SYSTEMATIC APPROACH
$
%%
'*#
This systematic approach can be combined with a
localised approach (see the next section) which will help protect
a distance of 100 feet. the structure against progressive collapse by increasing the
@
@
^@
*Jq*,q
on the threat and risk analysis. This concept is covered in the
UFC guidelines9 where the levels of protection correspond to
those in these guidelines according to the following table:
7.3.2 GENERAL GUIDELINES
^
,,@
J@
,
, *,: J
*, q
@
,
local failure from element to element, eventually resulting in the Category M and H buildings.
collapse of an entire structure or a disproportionately large part
of it. Progressive collapse occurs, for example, when the loss
of one column results in the collapse of a portion of the building.
There are two general approaches to design against progressive
collapse. The systematic approach considers the building as
a whole while the localised approach focuses on strengthening
@
,Jq*,
9
UFC 4-023-03, 25 Jan 2005 and Progressive Collapse Analysis
*,
+,
*, '
Modernization Projects June 2003
Page 89
EXAMPLES OF DESIGN CONSIDERATIONS FOR THE
SYSTEMATIC APPROACH
Page 90
Detailing –J
*:
,*,
J
*
,#
@
@
q
^,
spans must take into consideration the loss of lateral support for
the column. Shear reinforcement in the column is important for
close detonation of explosives.
Page 91
CONCEPT SOLUTIONS FOR COLUMN PROTECTION –
CLOSE DETONATION
This section considers a detonation of an explosive
charge at a distance of between 1 and 3 metres. A closer
,,q
`,J
structure should be designed in such a way as to ensure that the
loss of one column will not result in progressive collapse. Special
care should be given to corner columns. If a localised approach
is adopted, the column should be designed against local failure.
Details on shielding and sleeve protection can be found in Figure
105: Reinforced concrete column with steel sleeve.
Page 92
GUIDELINES FOR DYNAMIC ANALYSIS
Loads on the walls could be calculated using the Conwep
software package or similar. Dynamic analysis using a SDOF or
MDOF model should be undertaken for the wall panel, using a
permissible ductility of 4 for reinforced concrete. The equivalent
reaction should be calculated and the maximum shear capacity
of the wall must prove to be greater than or equal to the applied
shear forces.
Page 93
7.4.6 SLAB PROTECTION
This section considers a detonation of an explosive
charge at a distance of 3 metres or greater. The main slab to be
J
,q
J
*
`Jq@
^
q
J q
q ^ : ,: J J
slab may be exposed to high lifting forces.
Page 94
8 SECURITY SYSTEMS
The objective of this chapter is to provide basic security Security systems are usually used for the following purposes:
design guidelines that will enable architects and electric system
engineers to make the right decisions when choosing the Detect illicit activities or intrusions.
@
J *: *@ J
q *
when deciding on its positioning throughout the building. Warn designated security personnel of hostile activity and/or
breaches of security to the building.
Technical and electronic systems such as CCTV and
alarm systems are part of every modern building plan and are Monitoring of activity in sensitive or vulnerable locations.
considered basic. These security systems which are installed
throughout the building usually consist of: Recording activities for future investigations.
End points, which are the systems’ data gathering sensors Deterrence.
(e.g. detectors, cameras, etc.).
Replacing or supporting human security resources for cost
Base points, which receive and process all the input gathered effectiveness.
by their system’s end point (e.g. CCTV matrix, alarm system).
Assuring the proper function of physical security elements.
Cabling, infrastructure and wireless channels.
The systems are usually meant to assist in the When planning the security systems layout for a building,
implementation of the building maintenance plan, the it is recommended to take into account possible future upgrades
administration plan or the security plan. Some systems are and enhancements of the systems’ capabilities. Such planning
dedicated to serve one of these plans while others play two or should enable the system at least 50% growth and should include
^J
,
J
,`J extra deployment and installation of alternatives for the system
electronic security systems into the overall electrical design of the and added infrastructure that will enable the installation of more
building has many advantages. It will help to assure that the end end points. This pre-planning will allow the building’s security to
points are positioned in a manner that enables them to perform in conduct low-cost future upgrades when necessary.
the best way. It will also help to assure that the systems’ cabling
will be installed in such a way that will make it as unnoticeable as
possible and that the spaces and features in which the systems
are meant to be located are adequate, and will not hamper their
performance. 8.1 HOW TO USE THIS CHAPTER
This chapter contains information on security systems
Early planning of the systems will also allow important and security related systems, located in the various parts of a
coordination between the building domain, the human domain building development. The Protection Recommendation Tables
and the technology domain. This will assure minimal changes (PRT) in Chapter 4, mention a list of protection elements that can
and additions once the building is occupied and hence avoid be found in this chapter. Each protection element is described in
additional and unnecessary security costs.
JJ@
@
,
If desired, protection elements in this chapter can be implemented
:
,,J,*q
J, even if they are not recommended for implementation in the
security products made by different manufacturers. Only a PRT. For each element, the levels of protection are mentioned
relatively small number of these systems are tested and approved and standards are described. The level of detail provided is
by national laboratories or military institutions around the world.
@
^ *,, J, @
q* J
to provide basic knowledge and to assist in the procurement
These technical systems are usually not considered to be “life
procedure to ensure that the right demands are made of suppliers
saving” systems but are operated as “support” systems that and/or protection engineers.
give an extra value to the security deployment of a building. It
is therefore advised that the project team consider whether their The following protection elements appear in this chapter:
@
J*
@@
^:JJ
usually more expensive). In some cases non-approved systems
might be adequate for performing a minor supportive role.
Page 95
8.2 SECURITY CONTROL ROOM The security control room design must allow it to function
as an effective tool for managing the security operations of the
8.2.1 INTRODUCTION building in both routine and emergency situations. In order
to perform its tasks, the security control room must have the
The security command control room is the nerve centre following capabilities:
of security operations for a building and should receive and
provide vital information to and from the security personnel on Collecting all the data required in order to formalise a clear and
J
|*^
@
q
J complete picture of the current situation throughout the building.
routine and emergency situations. The data received and presented should relate to, among other
things, any regular and irregular activities, crowd concentrations
An effective control room that focuses on relevant and security related incidents. The data should be collected
threats can make the difference between a proper response during both routine and emergency situations.
and chaos, once an incident has been initiated.
,
* ,^
q:
A building’s security operation should be aimed at both cutting down the number of monitors that need to be watched
crime and terror prevention. The level of effectiveness in which and prioritising inputs received from the security cameras and the
crime and terror prevention operations are carried out is greatly alarm system in a way that will make sure that only real incidents
dependant on the capabilities of the control room and its operating @ *@ q: J
,
: J q
staff. include:
A typical control room should contain all of the main Communicating information to both staff and visitors in
operating stations of the security systems installed throughout emergency situations.
the building. The control room should also contain sub-stations
of several of the building’s management systems such as the air- Assisting in and monitoring the evacuation of the
conditioning and lift control systems. Some of these substations building’s occupants when necessary.
should have overriding authority over the main station, whereas
others can have regular operating capabilities or should be limited #*@@
to view only. responders while they are performing their respective
responsibilities.
The following systems should be included in a security
control room: Operate in full function during post attack periods.
Page 96
IV. The security control room plays a critical role in a building’s CCTV MONITORS & RECORDERS
security deployment. It is therefore recommended to design its
protection in a robust manner. The purpose of these measures I. The number of constantly viewed monitors should be
is to make the security control room able to withstand an attack limited to a minimum and should not exceed 8 images per person.
either against the building it occupies or a direct attack against The images for each person could either be presented on a single
the security control room and continue to function both during large monitor or on several smaller ones.
and after the emergency. The entrance to the security control
room should be equipped with an access control system and II. The minimal image size is 10”.
forced entry. These measures are meant to ensure that no
un-authorised persons will gain access to the security control III. The monitors should be located in a way that allows the
room. person in the control room to perform his regular duties (phone,
log book, access control) and monitor the cameras without
V. The lighting in the control room should be designed in a interference.
way that will ensure that it does not cause glare on the various
monitors. For this purpose, it is recommended that the control IV. All data received by the systems (CCTV, alarm, access
*
,J control) should be recorded for post incident investigation. The
required recording rate (FPS), the recording’s resolution, and
VI. The security control room should be equipped with a the period that the recordings are stored for, should follow the
working surface that is positioned in way that will allow the security guidelines in Section 8.7. It is important to note that issues
control room operator to have a good view of the monitors. pertaining to data storage have implications both on operational
matters (e.g. face recognition) and on administrative matters (e.g.
VII. The security control room should be equipped with amount of space required for holding the equipment).
emergency power and lighting to enable it to continue to function
during power failures.
ALARM
VIII. The security control room should be equipped with
a climate control system. This is meant to help create a more I. Indication of alarms, transferred to the security control
comfortable working environment that will assist the security room, should appear in the most accurate way possible. Alarm
control room operators to stay alert, especially during night-time indications are required to relay the exact location of the breach
and long shifts. or event to the security control room operator. Each indication
should also be accompanied by a visual picture of the location
IX. The security control room should be supplied by at least where the breach or event is taking place.
two separate power lines. One dedicated to security systems
while the other for administrative purposes. EXAMPLES OF DESIGNS
X. When planning the security control room, there is a need
to designate an area for administrative proposes. This area
should be planned and positioned in a way that will ensure that
any activities conducted within do not interfere with the security
control room’s regular operation and in emergencies.
EQUIPMENT ROOM
I. It is recommended to place other electrical equipment
used by the security control systems that are located in the
security control room, in an adjoining but separate room.
`0 J
|*J*,,J*:
control room and its adjoining equipment room (where applicable)
must be of a kind that, if operated, will not cause damage to the
electrical equipment.
Page 97
8.3 INTERCOM AND COMMUNICATION
SYSTEM VI. When designing a non-matrix intercom system for
access control, it is important to make sure that the system’s
8.3.1 INTRODUCTION cabling enables communications between the unit installed at the
An intercom is a private telecommunication system that access point and the units installed both at the access control
allows people from two or more locations to communicate with point and the security control room.
each other. Although usually considered administrative systems,
intercom systems and other similar communication systems VII. Most intercom systems need to undergo maintenance on
play an important role in a building’s security deployment. This a regular basis. It is therefore recommended to install them at a
is especially true with regards to access control. The intercom location that will allow for the maintenance work to be conducted
system enables the personnel operating the access controlled in a convenient manner.
doors or gates to communicate with the people wishing to enter
the building, without exiting the relatively secure inner area in VIII. Exterior intercom units should be protected against
which they are positioned (whether it is located inside the building environmental conditions such as temperature, humidity and rain.
or in an external security post).
IX. Exterior intercom units should be designed with anti-
There are many types of systems that can be used as an intercom vandalism measures.
system, these include:
X. Intercom units that are installed at vehicle entrances
Standard point to point intercom system (party line systems). should be designed in a way that will not require drivers to exit
Matrix systems. their car in order to operate them. For example a call initiator
Videophone systems. can be connected to a detector that operates it as soon as a car
Wireless systems. approaches the designated area.
Telephone based systems and others.
¡` @q
q*,J,^,:,,
window openings could potentially stop radio communication
8.3.2 TERMS AND DEFINITIONS with emergency responders who are inside the building. With
the installation of cell enhancers, communication by radio among
emergency responders becomes possible between the interior
and exterior of the building and within the building between the
different storeys including basement levels.
Standards
The system should comply with the relevant construction
and electricity related standards.
8.5.1 INTRODUCTION
Alarm systems installed in buildings and/or complexes
are aimed at detecting both unlawful intrusion and lawful entry
@ , : **,,:
*
a combination of elements (sensors, keyboards, control units
8.4 PUBLIC ADDRESS SYSTEM and others) that create a “smart” system. This “smart” system
is programmed to be able to monitor various parameters, which
8.4.1 INTRODUCTION may include, but are not limited to, the following: opening of doors
,
^
The public address (PA) system plays an essential role shifts in temperature; change in lighting etc. The type and number
when it comes to emergency procedures. During emergency of parameters monitored by the system can vary and should be
situations the system can be used to convey life-saving designed according to the requirements of the building’s security
instructions to the general public. The PA system must be plan.
designed as an integrated part of the building’s intercom system
and other security systems. A typical PA system will include the
An alarm system will usually consist of:
following:
Detectors of various types
Keyboards
Indoor / outdoor speakers
Control Units
@,
Display units
Microphone
Diallers
Area division panel (to be able to address parts of the building
Cabling
individually)
Sirens
Backup batteries
8.4.2 TERMS AND DEFINITIONS Optional – remote controls/ wireless items / signal lights
Page 99
8.5.2 TERMS AND DEFINITIONS
Page 100
VI. Alarm systems should have two sets of detectors
J
*
J,,
@J
are supposed to be permanently closed (e.g. emergency exits),
and (b) day/ night detectors, that are installed on doors that are
regularly opened during day/ activity hours but closed during after
J
* J
J
:@
,,q,J:
@
*@*
manner. The two sets of detectors should be designed to sound/
give out different types of alarms at different situations (e.g. a
buzzer during the day and siren at night).
Standards
The system should comply with the construction and
electricity related standards.
8.5.4 EXAMPLES
Page 101
Figure 132: Example of an alarm system layout
Page 102
The security related access control system must be 8.6.4 EXAMPLES OF DESIGN
designed together with the other security systems. This section
will relate to access control systems while other access control
issues can be found in Section 5.4.
Card readers.
Control panels for opening doors.
Electromagnetic locks. Intercom
Electric locks.
M switch
Emergency escape buttons (glass break).
Open door detectors (magnetic switches).
Access control management software.
Access control management stations.
A door closer. Access Controller
Page 103
8.7.2 TERMS AND DEFINITIONS 0` ,,:J
*,q
J
|
, ,J
,
^ J
q * q:
non-authorised users. In addition to these, it may be good to
install PTZ cameras (especially in areas where there may be
mass congregations or main thoroughfares) to allow the security
surveillance operators to pan, tilt or zoom as and when required.
MONITORS
I. All monitors should be capable of displaying colour
images and have appropriate adjustment controls (e.g. contrast,
brightness, sharpness, etc.).
RECORDING EQUIPMENT
` J:*
@
*
capacity to enable the continuous 24-hour recording of each
camera and archival of at least 28 days, with an additional 10%
*q* #*
^
J
*,,
be kept to replace those seized by security agencies for post
incident investigations.
Page 104
IV. The recorded image should at all times be accurate, Table16: Summary of Recommendations for Key Areas
J@,:
J *
,
* @
*
*
normal lighting. For reduced lighting or emergency lighting
conditions, the recorded image should minimally be an accurate
@
*
J
J
PLAYBACK FACILITIES
I. The CCTV system should provide for the playback,
removal or transfer of any image from any camera recorded up to
28 days prior (in a controlled environment).
EXPANSION CAPABILITY
I. The installed CCTV system should be designed to
allow for future expansion or additional capacity with minimum
disruption to the working system.
III. Lifts – For lifts which act as alternate entry and exit points
to the building, frontal view of the lift doors for people entering the 8.7.4 INSTALLATION & OPERATION
building and general views of the associated lift lobby areas are
to be monitored at ‘Enhanced Detection (20%R)’ level. INSTALLATION OF THE CCTV SYSTEM
I. The positions of the cameras should be carefully
IV. Checkpoints – For locations that involve security checks planned and located to provide the required coverage with the
or registration before people are granted permission to proceed minimum number of cameras. Account should be taken of the
further into the building like checkpoints and ticket issuance effect that periods of maximum human density may have on the
counters, the CCTV system should capture the frontal view of achievement of the operational requirement.
people at ‘Recognition (50%R)’ level.
II. Notices strategically located around the building should
V. Sensitive areas – These include rooms or open areas be provided to inform members of the public that the CCTV
that house important and critical equipment, documents, system is being continuously monitored and recorded.
property and people e.g. warehouses, locker facilities, etc. In
particular, cameras should also cover facilities involving monetary
transactions, such as at banks, money changers and ATM
machines locations. Cameras at these areas should be installed
with a minimum image height of ‘Enhanced Detection (20%R)’.
`
J
J
*,q
J*
,
upon activation of the alarm, trigger the display of the image of
the relevant camera(s) automatically on a dedicated monitor.
Page 105
CCTV OPERATING STAFF
``` @
* *,J[
^
@*@
: I. The shift patterns adopted for the CCTV operating staff
a soft and hard copy of each of the agreed camera views and J
*,,**
q
*J,J@
*^:
image quality (both monitor view and the recorded image) should of the staff.
be taken and reviewed by the building’s Security Manager, to
*JJ
,
^*,:
J II. The CCTV operating staff should undergo the appropriate
VI. The camera ID and the date and time should be displayed
on monitors in a single imposition and for the recorded image
be located where it is least likely to obscure or interfere with the
image of the main subject.
Page 106
8.7.6 DEFINING AND MEASURING FIELDS OF VIEW
FOR CCTV SYSTEM
CATEGORIES OF VIEW
I. Fields of view required for CCTV systems are described
by four categories of view as follows:
a) DetectionKJ
*
*@,$>¤
the available screen height. Following an alert an observer can,
after a search, ascertain with a high degree of certainty whether
or not a person is visible in the pictures displayed to him.
a) Detection - Not less than 10% R. II. Video Surveillance System (VSS) – Standard For Bus
Interchanges (Version 3.0, dated July 2006);
b) Enhanced Detection (ED)-Not less than 20%
R. III. Video Surveillance System (VSS) – Standard For Mass
Rapid Transit (MRT) Stations (Version 3.0, dated July 2006);
c) Recognition - Not less than 50% R.
IV. Building a Building Security Code (BSC) Framework in
d) +
- Not less than 120% R. Singapore (Version 7.0, dated 18 Aug 2006);
III. For Detection (10%R) and Enhanced Detection (20%R), V. CCTV Cameras Standards for Police Establishments
*JJ
J*
,: (Version : 3.0, dated 22 Dec 2006);
above the threshold of human sensitivity and that the picture is
not unduly cluttered with non-targets. VI. Draft for Public Australian Comment Standard – AS
4806.1 Closed Circuit Television, Management & Operation Code
`0 +
>¤ `
$>¤ of Practice (dated 16 Sep 2005);
is assumed that the angle of view and lighting is suitable and no
*Jq,**
0`` 990@
,*'*,K¦
out of focus is evident. #
^,
@J0
>§>>"
Page 107
8.8 SECURITY LIGHTING FOR CCTV
SYSTEMS
This section discusses the lighting requirements
for security systems including CCTV. For general lighting
considerations, please see Section 5.7.
8.8.1 INTRODUCTION
#*
,J:
@
@,
q
seen. From a security point of view, lighting that is strategically
placed can increase the effectiveness of CCTV systems and
guard work while reducing the chance of criminal acts occurring
in the illuminated area. The basic level of lighting should allow the
security deployment (CCTV and guards) to identify a human face
from a distance of about 10 metres.
8.8.4 DESIGN OF SECURITY LIGHTING
If the area is intended to be used during the hours of
darkness, the lighting system should provide adequate visibility I. Lights located in vulnerable locations should be protected
for the intended night time operation. Pedestrian walkways, back against vandalism by means of vandal resistant materials and
lanes and access routes open to public areas should have a basic design.
level of lighting. Inset spaces, signs, entrances and exits should
be adequately lit so that CCTV coverage would provide a clear II. Lighting design should take into account the various
picture. current and future obstructions that may cause light to be blocked
(e.g. various types of vegetation, such as trees).
Security lighting is employed in order to increase the
visibility around perimeter lines, buildings, and sensitive locations. III. Design proposals should take into account the possibility
It is a security management tool that is applicable in almost all
environments within an urban development. Proper lighting of night time outdoor activities and should specify the type,
can greatly improve the combined operation of other security location and intensity of the various lighting elements that will be
systems, particularly CCTV and other surveillance measures, installed.
and therefore it must be designed to compliment these systems.
IV. Lighting should be equally spread out, reducing contrast
8.8.2 TERMS AND DEFINITIONS between shadows and lightened areas. It is recommended to
*
|* J ,
J J
|*
with higher wattage. This will help reduce the creation of deep
shadows and will help avoid excessive glare.
Page 109
9 SPECIAL ATTENTION AREAS
Most buildings have rooms or operational areas that The following protection elements appear in this chapter:
require special attention in terms of security. These operational
areas are usually required for the basic functions of the building
such as access control, loading and unloading, parking, building
maintenance, mail delivery etc. Addressing the security and
protection requirements for these areas is essential for maintaining
the security level in the building. Ideally, the protection should
be designed in such a way that there is minimum interference
with the original operational design of the building. Nevertheless
in most cases, answering security needs will require a certain
degree of change to the building’s everyday activities. Most of
the security changes to these areas will be aimed at the following
goals:
9.2.3 DESIGN OF A CAR PARK I. The entrances to car parks should be designed with
access control check points, which can either be automated or
GENERAL controlled by trained security personnel (see Section 5.5.3 for
guidelines). The entrances are the most likely locations for attacks
` *: |q,:
** and therefore should be positioned as far away as possible from
control and screening needs should be taken into account when primary structural elements (a minimum of 10 metres). The
designing the entrances to the building from the parking area. J
*,,
q@
:
This usually means providing adequate space for screening from crowded critical areas.
equipment and security personnel and planning for the provision
of utilities such as electricity and adequate lighting. This is true II. The entrances and exits must be equipped with an anti-
even when current access control procedures do not require ramming vehicle barrier to an adequate level (see Section 5.4
a security check at the access point since an upgrade may be for details).
necessary at higher threat levels.
II. When planning and positioning areas in the site during 9.2.4 EXAMPLE
J
J
*, q
between the car park and the location of any potential dense
crowds (such as conference rooms) or sensitive areas. This
is relevant not only for underground car parks belonging to the
building, but also to any neighbouring underground car parks that
:*Jq*,
Standards
All standards and guidelines against progressive collapse
(see Chapter 7.4) are recommended for car parks. In the
building core and in populated areas, it is imperative that
these standards be followed.
PARKING LOCATIONS
I. Parking alongside primary structural elements should be
prohibited. If that cannot be achieved, parking along the primary
structural elements should be limited to screened vehicles
of trustworthy people such as residents or management. In
all cases, a physical barrier is required to maintain a distance
between the vulnerable element and the nearest parking location.
Page 111
9.3.2 TERMS AND DEFINITIONS 9.3.4 EXAMPLES OF DESIGNS
ELEVATORS OR STAIRCASES
When designing elevators or staircases at entrance
areas, it is necessary to plan an option for deploying access
control systems and forced-entry resistant gates/doors which
could be locked during periods of high alert. The entrance area
which usually connects to the elevator or staircase should be
equipped with electricity and low voltage infrastructure and space
to cater for the possible deployment of screening equipment in
the future.
Page 112
9.4 LOADING DOCKS LOADING DOCK LOCATED UNDERNEATH THE BUILDING
No primary structural elements should be located in the
9.4.1 INTRODUCTION loading dock. If this is unavoidable, then the structural engineer
Most modern buildings have designated areas for must design the primary structural elements for maximum
,
*,
*@
J *:J
q
^q,
J
*,q
and all other deliveries to the building. Commercial buildings in the same manner, and no critical building element or important
such as shopping malls or hotels require the loading dock to be a building functions should be located there.
relatively large area. Loading docks can be internal or external.
Access control issues for loading docks are discussed in LOADING DOCK LOCATED AT THE SIDE OF THE
Section 5.4.5. In this section, the security and protection issues BUILDING
for loading docks are considered. These guidelines will have to
be coordinated with the operational procedures which, especially The loading dock should be located as far away from the building’s
in commercial buildings, must take into account the unloading wall and primary structural elements as possible, but in all cases
time, queuing time and subsequent line of waiting vehicles which a distance of no less than 10 meters should be ensured between
could build up. There are two typical locations for a loading dock: primary structural elements and the vehicle parking positions. If
this is not possible, the structural engineer must design primary
In the basement of the building, under its main structure structural elements for maximum redundancy. No large opening
should be located at or overlooking the loading bay. If this is not
At the side of the building (above or below ground), away possible, glass and other building materials must be protected to
from its main structure the highest blast resistant level (see Chapter 6 for details).
For more security design details regarding the entrance,
parking, access control and other subjects, please refer to
Chapter 5 or Chapter 7. 9.4.4 EXAMPLE OF DESIGN
Page 113
9.5 GARBAGE AND WASTE DISPOSAL DOCK 9.6.3 DESIGN OF MAIL AND DELIVERY ROOMS
9.5.1 INTRODUCTION The room should be located near the entrance to the
Garbage and waste disposal areas, rooms and docks building in order to prevent delivery people from unnecessarily
can be designed in many ways. From a security point of view, entering the building. It should be located to the side of the
it is an area that is close to or inside the building, and which building and never in or attached to a main structural element
has openings to both the secure areas of the building and to such as a building core or staircase. It is recommended to build
the unprotected areas outside of its perimeter. The purpose the room from reinforced concrete and design it as a structurally
of this section is to give the architect and engineer guidelines insulated box with walls that can withstand an inner static
for designing protected waste disposal docks or areas without @*,
>>@J
J
*,q
:
compromising their functionality. the insulated mail room and additional permissible load of 10 kpa
for inspection equipment. The door must open inwards and be
There are two types of garbage and waste disposal areas: designed to withstand the aforementioned blast load (for more
details see Section 6.6.3).
A disposal area that can be accessed by the contracted
service provider without passing any security checks or The room should have no connection to the building’s
barriers. main ventilation system or openings. All openings or ventilation
A disposal area that can only be accessed after passing for the mail room should be separate and ventilated to the
through a security check or barrier. outside. The room should be provided with an electricity and low
voltage infrastructure to support X-ray equipment, HHED and
J
*@J
J
*,q
J990
coverage and an intercom and door which should be closed
9.5.2 DESIGN OF GARBAGE AND WASTE DISPOSAL during inspection.
AREAS
Page 114
9.7 VIP HOLDING ROOM
It is also recommended to allocate an area for VIP cars.
9.7.1 INTRODUCTION The area should be closed or protected against all types of
intruders including pedestrians and should be covered by CCTV
VIP holding rooms are common in modern buildings and detectors. There must also be escape routes close by.
and especially in government buildings and luxury hotels. A VIP
holding room can be any room that can accommodate the head 9.7.3 EXAMPLE OF DESIGN
of an organisation, a meeting room for important or threatened
people, or the presidential suite in a hotel that may accommodate
celebrities or politicians. Such rooms should be designed in a way
that physical protection and security procedures will be relatively
easy to implement in the future and with minimal incremental
cost.
Standards
There are no special security standards or regulations for
VIP holding rooms, however there are standards which
apply to the equipment and procedures as detailed in
Chapter 5 to Chapter 8.
Page 115
The main entry way is recommended to be via a double- Every window or other opening, including ventilation or
door interlocking entry hall with forced entry resistant capabilities air-conditioning ducts must be closed off with forced entry resistant
on the inner door. There should also be CCTV and intercom bars to a minimum 5 minutes resistant (see Chapter 6 for testing
equipment to cover both doors (see Chapter 8 for details). All standards). It is highly advisable to have all the above openings
exterior windows or glass façades in the room should be blast
J
, : JJ
@
@
J
JJ J
,
alert against intruders or an attempted break-in. Areas containing
(see Chapter 6 for design details) as follows: *@@,:,
,
:
must be locked at all times and access should only be permitted
for authorised personnel.
Standards
All recommendations in this section must comply with the
safety and building regulations standards and other legal
requirements.
9.9.3 EXAMPLE
,,
q
with magnetic switches and/or glass break detectors connected
to an alarm system.
If safes are to be placed in the protected room either now
or in the future, this should be considered during the design stage
*JJ
*@@
,
$>>>@
m2 as the minimum design criteria.
Standards
All accepted building and safety standards must be applied
in the design and all relevant guidelines in this document
should be followed. If there are major contradictions
between the two, the national standards should always
prevail and the security and protective design/blast
consultant(s) should be informed.
Page 116
9.10.3 DESIGN OF AN AIR-CONDITIONING SYSTEM 9.11.3 DESIGN OF WATER SUPPLY AND TANKS
The vents which provide the intake of fresh air must Mandatory requirements for security of water storage
be positioned as high as possible to ensure that they cannot be tanks for potable water supply in buildings are stipulated in the
reached from a public location. The air intake pipes and their Public Utilities Act, Public Utilities (Water Supply) Regulations
location must be protected against any intruder or object thrown and the Singapore Standard CP 48 – Code of Practice for Water
from a minimum of 10 metres (the protected area should be far Services.
more than 10 metres). It is highly recommended to place the
collection of intakes on the private protected building roof as far The requirements state that all drinking water tanks and
as possible from any threat. their ancillary equipment must be secured against unauthorised
access. They must be housed in a secured and locked dedicated
Any feed or exhaust for the air-conditioning system tank/pump room or located within a secured and locked enclosure.
including air pipes, air intakes and vents should be closed J J
J
^
@@
J J,,
with forced entry resistant bars or mesh to a minimum level of be within the secured and locked dedicated tank/pump room,
5 minutes resistant (see Chapter 6 for testing standards). In ,
*
J
^
@@ J,,
@
*
JJ,:^q,
J^,,Jq
^
@
outside the secured and locked room, enclosure or area.
with detectors and connected to an alarm system to alert against
intruders or an attempted break in. It is also recommended to Additional security measures to be considered would
provide the infrastructure for future installation of detectors of toxic be for all entrances to the water tanks rooms or openings and
or other biological/chemical agents in the air-conditioning system pipes main valves to be closed with forced entry resistant doors/
(these can be combined with smoke detectors). These should mesh and windows to a minimum level of 5 minutes resistant
be located at the main intake of fresh air and on the exhaust vent (see Chapter 6 for testing standards). It is highly advisable to
J
@,,:@*q,
add detectors to all the above openings and to send an alert to
security in the event of intruders or an attempted break-in. This
It is highly advisable to install valves/shutters to close is all designed to make it very hard for anyone to sabotage the
not only the main fresh air intake, but the intake and exhaust vent system or insert dangerous materials into it.
from every room. These valves/shutters will be activated when
a biological/chemical agent or smoke is sensed by the detectors. ` J
@*
,:
They can be operated automatically or manually by the security or the facility it must be locked in a room with the same protection
operational control room. It is also highly advisable to allocate an level as above (5 min forced entry resistant) and must include
J,
, an access control system on the door and detectors against
system into the main air-conditioning system. This will provide a unauthorised entry.
**
@
@
^
,,:
@
^
J
J*
^,^ It is highly recommended to provide the infrastructure for
detectors to be added to the water system in the future to detect
toxic or other biological/chemical agents (this can be combined
J @*
` q,
,
*J
detectors at the main intake pipe (to check the incoming water)
9.11 WATER SUPPLY AND TANKS and the supply exiting from the tank (to check the water supplied
to the building’s residents).
9.11.1 INTRODUCTION
Water in most buildings in Singapore is supplied through
large pipes that feed into reservoir tanks located within the building.
The threat to the drinking water supply is mainly from inserting a
biological or chemical agent into the water that will affect everyone
that drinks it. The insertion could either be into the pipes or more
simply, into one of the reservoir tanks. In most buildings there are
separate tanks for drinking water and for utilities. The description
below is for the purpose of security and protection of the drinking
water only, and does not necessarily relate to the water supply in
each building. The purpose of this section is to give the system
engineer and design team recommendations for more secured
water line design and implementation.
Standards
Mandatory requirements for the security of water storage
tanks for potable water supply in buildings are stipulated
in the Public Utilities Act, Public Utilities (Water Supply)
Regulations and the Singapore Standard CP48-Code of
Practice for Water Services.
Page 117
APPENDIX A
PART 1: PROCESS
2 ASSESSMENT PROCESS
Page 118
c. Vulnerability Assessment III. TERRITORIAL REINFORCEMENT. The master plan
Vulnerability is any weakness that can be exploited by an should incorporate the provision of clear boundaries between
aggressor, or, in a non-terrorist threat environment, make an public and private areas. This could be achieved by using physical
asset susceptible to hazard damage. The Consultant shall elements such as fences, pavement treatment, art, signs, good
^,*@
q*,J*, * maintenance, landscaping, etc, to express a sense of ownership
identify the vulnerabilities of building functions, systems, etc. The by legitimate users and create territorial reinforcement. The space
Consultant shall rate the vulnerabilities and justify the basis for or area being reinforced should have clear legibility, transparency
the ratings. and directness to discourage potential offenders because of the
users’ familiarity with their environment.
d. Risk Assessment and Management
The Consultant shall evaluate the risks using a threat-vulnerability 5 SITE PLANNING AND DESIGN CONSIDERATIONS
matrix. The Consultant shall rate each of the risks and justify the
basis for the ratings. The Consultant shall identify the top risks FOR VEHICULAR THREATS
where measures are necessary to mitigate the vulnerabilities and The Developer shall incorporate within the building
reduce the risks. master plan, principles that facilitate the protection of the building
from vehicular threats. This includes preventing progressive
collapse of the building due to damage caused to critical
structural elements by an explosion that occurs in proximity to
3 SECURITY AND PROTECTIVE DESIGN PLAN the building and reducing the potential blast waves caused by an
SUBMISSION STAGES explosive threat in the form of a vehicular bomb. The method or
process of protecting the building from vehicular threats depends
The Consultant shall submit the security plan in 3 stages on its structural design and proposed site layout. To achieve
during its development for review and acceptance. The format this objective, consideration shall be given to stand-off distance,
and content for each stage’s submission shall be proposed and buffer zone and vehicle screening.
submitted to the building owner for review and acceptance.
a. Preliminary security and protective design plan – to be
submitted by the Consultant as part of the tender. I. STAND-OFF DISTANCE. The appropriate distance
from unscreened vehicles to the building should be considered
b. Detailed security and protective design plan – to be to protect it against vehicular threats. A buffer zone around the
developed by the Consultant in consultation with the relevant building to unscreened vehicles could be created using design
government agencies. features such as street furniture, urban landscape design and
bollards that can function as vehicle anti-ramming barriers.
c. Final security and protective design plan – to be
developed by the Consultant and agreed upon by the Developer. II. PERIMETER PROTECTION ZONE. This can be
achieved with the installation of perimeter barriers or layers of
barrier systems (e.g. planter boxes, natural landscape designs)
that meet the US DOS K4 standard or equivalent ASTM F2656-
07 or UK BSI PAS68:2007 standard12. Consideration should be
given to limiting the speed of approaching vehicles with good
PART 2: PLANNING AND DESIGN REQUIREMENTS
J*,
^J*,
:q:
offsetting vehicle entrances as necessary from the direction of a
vehicle’s approach (to force a reduction in speed).
4 SITE PLANNING AND DESIGN CONSIDERATIONS
FOR CRIME PREVENTION III. PERIMETER VEHICLE SCREENING. The provision
of space for vehicle screening shall be considered and located
The design of the building, including site layout and at an appropriate distance away from the building. The vehicle
landscaping, shall support the building’s functions. It shall provide screening bays shall include design features that can stop
a safe and secure environment for occupants and visitors. The vehicles, prevent them from leaving the screening area, prevent
Developer shall incorporate within the building master plan, tailgating and reject vehicles that fail the screening.
principles that facilitate the prevention of crime and public order
incidents.
12
US Department of State (DoS) SD-STD-02.01 ‘Vehicle Crash Testing of
Perimeter Barriers and Gates, Revision A, dated March 2003’, or ASTM
2656-07 ‘Standard Test Method for Vehicle Crash Testing of Perimeter
#!%>>"#@
0J,#*:
Page 119
6 SITE PLANNING AND DESIGN CONSIDERATIONS II. VEHICLE CIRCULATION. In order to ease congestion,
consideration should be given during the master planning of the
FOR PARKING q*,
@
,,[
*,
* J ,
multiple ingress and egress roads to the various car park areas,
The Developer shall incorporate within the building drop-off points and service areas. This should be developed in
master plan, the provision of safe and secure parking facilities
*
JJ
`@,:`@
*q
(if applicable). In order to achieve this objective, consideration to the LTA for approval (if applicable). The TIA Report shall also
shall be given to providing public parking, parking for authorised take into consideration the time taken to screen vehicles entering
vehicles and natural surveillance of all parking areas in the the building.
development.
III. PEDESTRIAN CIRCULATION. Consideration during
I. VIP PARKING AND ALIGHTING POINT (IF RELEVANT). the master planning of the building should provide footpaths
The site layout should take into consideration the provision of that are suitable for dealing with large crowds arriving from bus-
separate and dedicated car park space for VIPs. This will include stops and MRT stations (if applicable). This should also include
providing ingress/ egress into the VIP car park space that should segregating pedestrians from the vehicles leaving the location.
not be shared with other car park users. The alighting point for
VIPs should be covered or located at a basement. There should IV. PERIMETER ACCESS CONTROL. Consideration
be a secured passageway immediately at/or close to the drop should be given to pedestrians’ circulation routes during the
off point for VIPs. There should not be any direct line of sight master planning of the building to concentrate activities towards
into the passageway. There should not be any glass windows or designated access controlled points (or portals) and away from
, J@@
@^:
secured areas.
an explosion to injure the VIPs during the evacuation process.
V. BUS STOPS AND TAXI STANDS. Consideration should
II. BASEMENT OR MULTI STOREY CAR PARKS FOR be given to the location of bus stops, taxi stands and coach bays.
PUBLIC. If the car parking areas are located within the building These should be located at an appropriate setback distance from
(i.e. at the basement or multi-storey), the relevant threats and the building.
protective measures will need to be considered.
III. NATURAL SURVEILLANCE. All parking facilities should
be provided with consideration to maximise visibility across, as
well as into and out of the parking facility. The natural surveillance 8 ARCHITECTURE AND INTERIOR DESIGN
would also be improved by limiting vehicular ingress/ egress to a
minimum number of locations. a. Architecture
I. BUILDING SHAPE. The shape of the building can have
7 SITE PLANNING AND DESIGN CONSIDERATIONS a contributing effect to the overall damage to the structure caused
FOR EXTERNAL CIRCULATION by a bomb blast. Re-entrant corners and overhangs shall be
avoided as they are likely to trap the shock wave and amplify the
The Developer shall incorporate within the building effects of the blast. If curved surfaces are used, convex shapes
master plan, the provision for safe and secure external circulation shall be preferred over concave shapes. In general, simple
within the building boundary by considering effective site lighting, geometrics should be preferred.
signage, and landscaping.
II. OFFICE AND ROOM LOCATIONS
:
a. Site Lighting
,
*
0` * @
press room, holding room) should be located or treated so
I. EFFECTIVE SITE LIGHTING LEVELS. Consideration that the occupant(s) are secure and cannot be seen from the
should be given to providing effective levels of lighting at vehicular @*q, J^ @
q, J
J
*,
and pedestrian entrances and for vehicular and pedestrian face courtyards, internal sites or controlled areas. If this is not
circulation areas. Consideration should be given to providing possible, suitable obscuring glazing or window treatment should
perimeter lighting that is continuous and on both sides of the be provided, including blast and ballistic resistant glass, blast
@qJ,J
,@
*
curtains or other interior protection systems.
to support CCTV coverage.
III. MIXED OCCUPANCIES. Function rooms for VIPs’ use
b. Site Signage
:
,J
*,q@*
housed with other users. If they are co-located together, the
I. EFFECTIVE SIGNAGE. Confusion over site circulation, public areas should be separated from the sensitive areas.
parking and entrance locations can contribute to a loss of site
security. The master planning should incorporate a signage IV. PUBLIC TOILETS AND SERVICE AREAS. Areas that
strategy that considers off site and entrance signage, on-site escape surveillance or allow individuals or items to be hidden
directional, parking and cautionary signs for vehicle and persons. should be avoided. Public toilets, service spaces or access to
Consideration should be given to provide electronic signboards vertical circulation systems (e.g. stairways/ lifts/ elevators) should
that allow various messages to convey important information about be avoided in any non-secure areas, including the queuing area
arrival direction, measures in place, etc. It is also recommended before screening at public entrances.
that signs should generally not be provided to identify sensitive
areas. V. LOBBIES. This space is designed to separate the
secure and non-secure areas at the point of entry. It does not
c. Landscaping include access to vertical circulation systems. Access should be
controlled between the separate secure and non-secure areas
I. EFFECTIVE AND AESTHETIC. Consideration should with space provided for screening equipment to conduct checks,
be given to landscaping design elements that are attractive including turnstiles, walk through metal detectors, or other
and welcoming as they can be used to enhance security. For ^ * *
J
example, plants can deter unwanted entry, ponds and fountains @
^ J
*, q |q, @
q,
,,
can block vehicle access, and site grading (gradient) can also limit J
@
, q J
access. It is recommended that the master plan avoids creating area should be located within the secure area. Mechanical
landscaping that permits concealment of criminals or obstructs ductwork, piping and main electrical conduit runs should not
the view of security personnel and CCTV. extend into the non-secure area.
Page 120
VI. HIGH RISK LOBBIES (E.G. SPACE FOR QUEUING). III. EQUIPMENT SPACE. Public and employee entrances
These points of access will need to be designed or operated in should include space for possible future installation of access
accordance with the appropriate level of risk. High risk areas control and screening equipment.
should be enclosed in blast and fragment resistant construction.
The installation of features, such as trash receptacles or IV. ROOF ACCESS. Locking systems should be designed
,q
|
Jq*
J^ to limit roof access to authorised personnel.
high risk non-secured areas should be avoided. The structure
for high risk lobbies should be distinctly separated from the rest V. MATERIAL USED. The use of non-structural elements
of the building, but it can be located within the building setback such as false ceilings and metal blinds should be limited. If need
space. The area should be designed to mitigate the effects of be, lightweight non-structural elements can be used to reduce
a blast on primary vertical or lateral bracing members. The air :qJ+|*J,,:
J
pressure in high risk lobbies should be maintained at positive, or system above for strength can also be used.
relative to the exterior, so that contaminated air can be expunged
manually by opening the external doors. VI. EGRESS ROUTES. Egress routes should not be
clustered together in a single shaft or location but be separated
VII. LOADING AND UNLOADING BAY AREAS. The and spread out. The use of glass along primary egress routes
installation of critical utilities and services such as main switch and stairwells should be kept to a minimum.
board, water tank, standby fuel or generator adjacent to the
loading/ unloading bays should be avoided. These areas should
be an appropriate distance from critical utilities and services. The 9 STRUCTURAL DESIGN
recommendation for lobbies would apply at these areas as this
space is designed with secure and non-secure areas. It should The building shall be designed against both progressive
be separated from the access to the parking spaces (if any). and disproportionate collapse. The secondary goal shall be to
The area should be designed to limit damage to adjacent areas design the structural components against localised failure, and
and vent explosive forces to the exterior of the building. There
J
: q q,
J
should be space for screening equipment to conduct checks on occupants of the building. This will enhance life safety and
all incoming deliveries. facilitate rescue and evacuation. It is suggested that the design
to mitigate effects of blasts be done in conjunction with a detailed
VIII. RETAIL AND F&B SPACES. These areas should be threat assessment of the building and its critical components.
arranged, designed and operated such that products and staff The following items below are recommendations of how a building
are subject to the appropriate screening process. Retail and can be designed to resist both progressive and disproportionate
F&B spaces should preferably be accommodated within the collapse.
lobby, instead of within the main building. These areas should be
designed to mitigate the effects of a blast on primary vertical or a. Robustness
lateral bracing members.
The building shall be designed to comply with the robustness
IX. STAIRWELLS. Stairwells required for emergency *@
J,^q*,
*J
egress should be located as remotely as possible from areas CP65, BS8110 and BS5950.
where blast events might occur. Where possible, stairs should
not discharge into lobbies, parking or loading areas. b. Resistance to Progressive Collapse/ Alternate Load
Paths/ Removal of Columns
X. MAILROOM. The mailroom should be located away
from main entrances, areas containing critical services, utilities, J q*, J,, q
J
distribution systems and important assets. In addition, the effects of progressive collapse and disproportionate collapse.
mailroom should be located at the perimeter of the building with
an outside wall or window designed for pressure relief. It should J q J^ J
*J ^
* *J
have adequate space for explosive disposal containers. An area alternate load paths and inherent redundancy in the structural
near the loading dock may be a preferred mailroom location. system.
The mailroom should be built to withstand a blast due to a mail
or parcel IED. The air handling unit for the mailroom should be `*J*@
J
stand-alone. of Buildings to Resist Progressive Collapse by the Department
of Defence, USA or other equivalent documents be used as a
b. Interior Construction guideline to design the building against disproportionate and
progressive collapse. At a minimum, the removal of a primary
I. UNSECURED AND SECURED AREAS. Unsecured ^, ,
q ,
q
^ J
*,
building areas should be located exterior to the main building not cause the progressive collapse of the entire building.
structure where possible. Unsecured and secured areas should
be separated horizontally and vertically using buffer zones and/or
=
J
,,
Critical vertical load bearing building components should also
II. CRITICAL BUILDING COMPONENTS. The location of be explicitly designed to resist the design-level explosive forces
the following critical building components should be located at an
J #*J q, J
appropriate distance from any main entrance, vehicle circulation, J
*,
*
**, q
J ,
,^,
parking or maintenance area depending on the structural J,
J
:|
^J,@
treatment of the area. threats. It is recommended that this be viewed in conjunction with
a detailed threat assessment study of the building in order to
i. Emergency generator including fuel systems, determine the possible design blast loads.
:
@,*@@,:
ii. Normal fuel storage; d. Structural Systems
iii. Main switchgear;
iv. Telephone distribution and main switchgear; It is recommended that in the selection of structural systems,
v. Fire pumps; due consideration is given to the ductility and robustness of the
vi. Building control centres; system. A suggested list of desirable structural characteristics for
vii. UPS systems controlling critical functions; the mitigation of air blast effects and progressive collapse is listed
viii. Main refrigeration systems if critical to building below:-
operation;
ix. Elevator machinery and controls; I. MASS. Structural systems with inherently high mass
x. Shafts for stairs, elevators, and utilities; such as concrete are in general more resistant to blast effects.
xi. Critical distribution feeders for emergency
power.
Page 121
II. SHEAR CAPACITY. Primary members and/or their III. Floor System
J,, * J *, |*, @:
achieved before failure. Brittle shear failure shall be avoided to ` , J
#:
,:J**q,:
q
q:
q
^J
*,@@,:
:,,
III. CAPACITY FOR REVERSING LOADS. Primary +,
: J,, q
J q
members and their connections shall be designed for possible ,,
J
q
^*JJJ ,*
load reversals caused by blast effects. above does not cause subsequent progressive collapse.
IV. REDUNDANCY. Where possible, redundant load paths #**,J
:q
^**
shall be incorporated in the vertical load carrying systems to areas (e.g. lobbies, loading docks and mailrooms) should be
ensure alternate load paths are available in the event of the considered. Heavily occupied areas should not be located
failure of structural elements. *J **
^
,
*
cannot withstand localised breeching caused by package bombs
V. TIES. An integrated system of ties in perpendicular @,
J
directions along the principal lines of structural framing shall
serve to redistribute loads during catastrophic events. IV. Interior Columns
VI. DUCTILITY. Members and their connections shall ` , J
|
,*
be designed to maintain their strength while undergoing large under ‘Exterior Frame’ (mentioned above) should apply to interior
deformations. Ductile plastic design concepts such as strong columns as well.
column weak beam together with appropriate detailing should be
adopted. V. Interior Walls
VII. MATERIALS. Due consideration should be given to `
,, *
* ** J
*, q
materials selection from the view point of ductility and brittleness. designed to contain the explosive effects within the unsecured
areas. Ideally, unsecured areas should be located adjacent to the
building exterior so that the explosive pressure may be vented
outward as well.
e. Structural Elements
,,
9'
:
It is suggested that critical structural components be designed to unit) walls shall be reinforced vertically and horizontally, and
the following criteria:- adequately supported laterally. Anchorage at the top and bottom
J,,J,,q@q,
^,
@J *,,|*,@:
I. Exterior Frame of the wall.
|
,* J,, q @q,
@
,,J,,@ q,:@
[:
more stories without buckling. limit damage to supporting columns.
9
,*J,,q
J,
,:@ VI. Evacuation Routes (e.g. Lift Shafts, Staircase cores)
ties or spiral reinforcement to enhance shear capacity, ductility
and improve the performance of lap splices in the event of loss of : ^*
* *J , J
concrete cover. staircase cores of the building shall be constructed of reinforced
concrete or adequately hardened such that they are still available
#,
,*@,J,,q@, q
^ for evacuation purposes in the event of an emergency.
level as practical. Splices at exterior columns shall employ
@,[@
,
q*,:
such that the connection does not fail before the member develops f. Building Envelope
*,|*,@:
I. Walls
II. Roof System
,, J
*, q
J [,^, q,
*
J
*, q ^
J
:
*J J **, ,* * q:
J
* pressure loads. Any failure of the walls should be in the ductile
a ductile fashion which gives adequate time for the occupants
|*
Jq,
J
J,,
to respond. This can be achieved by providing adequate ties, should be at least as strong as the windows, doors or frames they
redundancy and ductility in both the vertical load bearing elements support.
@,:
`
^
,,q
*
J, II. Windows
,, ,q *
J
,[
J
,, J
*, q *
,JJ
,, `
:J J
Due consideration should be given to the provision of ties such the supporting wall should be capable of resisting the breaking
as the inclusion of shear connectors between the steel beam and pressure of the window glass. The window glass should fail
deck and the provision of a steel mesh within the concrete deck.
Beam end connections shall be capable of developing the ultimate before the frame, anchorage or supporting wall system.
|*, @:
J q
^
q, ,* [
[
column connections shall be able to resist load reversals. J J ,
J @q,
conventional loads should be used. The type of glass used
`JJ,:
J *@@[ should be laminated annealed glass. For insulated panels, only
post-tensioned systems shall be designed for load reversals
arising from blast effects. the interior pane needs to be laminated. Tempered glass should
be avoided for external windows as it is 4 times stronger than
+
,q@, : * annealed glass.
consideration should be given to mitigate punching shear failure
at the columns. Continuous bottom reinforcement shall be
provided across the columns to retain the slab in the event of
punching shear failure.
Page 122
J
J
*, J^ * q
10 MECHANICAL DESIGN
½-inch. The minimum silicone sealing around the inside glass
a. Emergency Functions
perimeter should be a ¼-inch, with a minimum tensile strength of
20 psi (138 kPa).
I. GENERAL. All emergency functions should be located
away from high-risk areas in protected locations with restricted
J*
@@
,:[Jq
qq,
access. Do not place them near structurally vulnerable areas
net curtains and catcher systems should be considered and used
(such as transfer girders). Harden and/or provide physical buffer
where applicable.
zones for the enclosures around the emergency equipment,
controls and wiring. Provide redundant and separated emergency
J, *@
q*
q,J
*,
systems as well.
be retained by the frame, be caught by catcher systems, or exit
J q*
:q:
J@@
@J
b. Ventilation System
III. Doors
I. AIR-INTAKES. Air-intakes should be located as high as
practical to limit access to the general public. For buildings of
J
*,
@
Jq,
J:q
more than 4 stories, air-intakes should be located on the fourth
against the door frame/jam. The door frame anchorage should
JJq*,
,,
have a lateral capacity greater than door leaf itself.
the roof or as high as practical. Locating air-intakes high on a wall
is preferred over a roof location. Sloping vent guards should be
,q
q@@
installed to prevent injection of foreign objects into the air-intake
a master key should have access to all doors, windows or
system.
receptacles (including service and utilities areas).
II. SURVEILLANCE. For public access areas, there
*q,[,
J
*,q*
^*
should be securing and monitoring of all air diffusers and return
along designated egress routes.
air grilles. Air-intake locations, fan rooms and other mechanical
rooms should also be under security surveillance and tied to the
IV. Louvres
alarm system.
*^
J
@J
*,q
J
III. EGRESS ROUTES. Positive pressurisation of egress
the supporting structure has a lateral capacity greater than that of
routes, stairwells and vestibules is recommended.
the element.
c. Utility Protection
*JJq,
J^,[
[
JJ
*JJ,
*^q J
*,qq*,
I. UTILITIES AND FEEDERS. Utility and feeder systems
of the louvers.
should be located at least 30 metres away from loading bays,
lobbies, parking areas and other high risk areas.
Jq
,qJ
*,q@
@,:
anchored into the structure behind the louvres.
II. INCOMING UTILITIES. Within the building and property
lines, incoming utility systems should be concealed (underground).
V. Cladding
These systems should not be located at vehicle screening points
or at high risk areas (e.g. lobbies, loading bay, parking areas).
J,J
*,@ q,:*JJ
panel thickness that is acceptable for conventional loads.
d. Water Supply
J , *@@
*@@
** J
*,
I. WATER TANKS. The water tanks should be located in
be designed to resist the ultimate lateral resistance of the panel.
a secured area and inaccessible to the general public or staff.
Mandatory requirements for security of water storage tanks for
9,
J
*, J^ ,
potable water supply in buildings are stipulated in the Public
transmission path into the main structure as practical to minimise
Utilities Act, Public Utilities (Water Supply) Regulations and the
shear and torsional response.
Singapore Standard CP 48 – Code of Practice for Water Services.
In addition, CCTVs should be installed to monitor activities in
+
J,
,*
J@:
this area.
vertical load-carrying members should be avoided. Instead, the
,J
*,
J
@J 11 ELECTRICAL DESIGN
J q*, J
*, , J ^
I. EMERGENCY POWER SYSTEM. Redundant
explosive forces and gases from the interior spaces to outside emergency power systems remotely located from each other
of the structure. An example is the use of blow-out panels and should be provided. The emergency power distribution feeders
window systems that provide protection from external blast J
*, q ,
J ,
*
*
pressure but fail or vent internal blast pressure. redundant routing paths to enhance reliability. Emergency
distribution panels should be located in rooms separate from the
normal power system and hardened where possible.
Page 123
II. FUEL STORAGE. Fuel storage tanks should be VI. ELECTROMAGNETIC DOORS. 1200 lbs Electro-
,
:
q*,@
[J magnetic locks should be used for all exterior doors. The magnetic
enclosures. Their access should be restricted and protected. switches should be able to be de-activated during emergency to
Fuel piping within the building should be located in hardened facilitate evacuation. In order to detect possible intrusion when
enclosures, and redundant piping systems should be provided to the switches are de-activated, CCTV cameras should be installed
JJ,q,:
J *,q*
:+*,
,, to monitor the movement at the egress points. As an added
stations should be located away from public areas and monitored security feature, these doors should only open from inside the
by CCTV. building.
III. TRANSFORMERS. Transformers should be located VII. DURESS ALARM OR ASSISTANCE STATIONS. Call
inside the building and away from public access. Multiple buttons should be provided at key public areas and areas that are
transformers should be located remotely from each other to
JJ
enhance their reliability should one transformer be damaged by
an explosion. VIII. MONITORING SYSTEMS. Physical/ electronic security
and monitoring system as well as backup power should be
b. Lighting provided.
Page 124
APPENDIX B
GENERAL SECURITY GUIDELINES FOR
HOTELS themselves expect to feel secure while visiting the hotel. It can
INTRODUCTION therefore be said that there is a commercial value in creating a
secure environment in the hotel.
¦
, @
: ** @,:
role in a country’s economy. They serve both the local and ¦
, J^ J J
international business communities and bolster the economy with challenge in designing security and protective countermeasures:
foreign currency. Terror attacks that target hotels can therefore
potentially cause great harm to a country’s economy. They are open to the general public.
They host large numbers of local and foreign guests.
Modern terrorism, as demonstrated in recent events, has *
@q:,*
targeted hotels and has made them a preferred target. Terrorist weight.
organisations understand the vulnerabilities of the hotel industry. They host major functions such as conferences, parties and
J:,
*J
J
* weddings that attract even more guests, who visit the hotel
attractions could have on tourism, the economy and on public for a relatively short period of time.
morale. It is these factors that have brought terror organisations Hotels routinely receive large numbers and amounts of
,J§`
*
@
J
@@ deliveries and supplies (both in volume and quantity).
mass terror attacks against hotels and tourist resorts. Hotels employ a large number of permanent and temporary
Standards staff.
There is a Singapore Standard for Hotel Security Luxury hotels often host or entertain both international and
SS545:2009 by SPRING Singapore. This provides a ,
,0`@
,,
*,q
framework for hotels to assist them in setting up a
security management system. The general directions presented in this appendix are divided
according to the following security rings:
The prominent past terror attacks against tourist centres include:
1. Deterrence
Coordinated attacks at different locations in Mumbai which 2. Pro-active Security
included 2 hotels, The Taj Mahal Palace & Tower and The 3. Perimeter Security
Oberoi Trident (November 2008, 173 dead and hundreds 4. Access Control
more wounded); 5. Security Command and Control Room
The attack on the Islamabad Marriott Hotel (September 2008, 6. Emergency Procedures
54 killed, more than 200 injured) where a suicide bomber
*@*
,,J|@,
^
J SECURITY RINGS
hotel;
1. DETERRENCE
Simultaneous attacks against three hotels in Amman
(November 2005, 57 dead and hundreds more wounded);
Deterrence theory explores the conditions under which one party
Attack against the Egyptian resort of Sharm al-Sheikh (July
can deter another opposing party from taking an action that is
2005, at least 88 dead and hundreds more wounded);
:
J
@::@,,:^
,^
The attack against the Hilton Taba and two beach resorts
either or both of the following aspects:
(October 2004, 32 dead and over a hundred wounded).
The attack on Park Hotel in Netanya (March 2002, 30 killed
I. The threat to use force in response to an undesired
more than 140 injured) where a terrorist took advantage of
action – this is aimed at making the opponent decide that the
a religious event in the hotel to perpetrate a mass murder
projected losses caused by the violent response will be greater
attack.
than the projected gains from the actions he wishes to perform.
Among the tourist attractions attacked in the region were:
II. The assurance of failure – this is aimed at convincing the
adversary that his planned actions are doomed to fail, thus giving
Twin bombings at Jakarta’s JW Marriott Hotel and Ritz-
him no gain.
Carlton Hotel (July 2009, 9 dead, 53 injured);
Bomb attacks in Bali’s Jimbaran (near Four Seasons Hotel)
Deterrence is both an aim and a by-product of a security plan,
and Kuta areas (Oct 2005, 23 dead, 129 injured);
and can be achieved with little or no extra cost.
The attack outside the Marriott Hotel in Jakarta (August 2003,
12 dead and over a hundred wounded);
When relating to deterrence in the protective security arena, the
The attacks against tourists in Bali (October 2002, 202 dead,
measures employed are usually aimed at making the adversary
many more wounded, and October 2005, 26 dead and more
think that he is doomed to fail.
than a hundred wounded).
The assurance of failure is created both by deploying robust
When planning security measures for a hotel, it is imperative to
and clearly recognisable security measures and by cultivating a
remember that the security plan should create a balance between
reputation of tight, effective security deployment.
the need to create a secure environment and the requirements
of the hotel to maintain an open, inviting and warm environment.
Providing the correct level of security measures throughout a
hotel can contribute to the hotel’s business as it is the host’s duty
to provide a secure environment to its guests and the guests
Page 125
A robust and clearly recognisable security deployment is achieved The solution to the apparent inferiority of the defending force
by: can be found in its inherent advantages. The security force can
usually afford better training for its personnel. The security team
I. Applying a pro-active security concept – security guards must be able to take advantage of the fact that it is operating on
that actively and visibly “hunt” the threat create an intimidating J
* J q, J
q
security presence and give the adversary the feeling that his detailed knowledge of their terrain which can provide them with
operative might also be singled out and apprehended by the tactical superiority during the adversary’s intelligence gathering,
security deployment. as well as during an attack.
II. Deploying visible technical security measures such as Pro-active security is a tool for enhancing the security unit’s
CCTV coverage of an area which could be interpreted by the advantages while minimising those of the potential attacker.
adversary as a pro-active security measure even if the footage
of the CCTV camera is not reviewed regularly (a fact that the Pro-active security is comprised of:
adversary is not likely to be aware of).
I. A pro-active mindset – The security guards must be
III. Implementing visible physical protection elements such educated to have a “hunter mentality”. This means that they
as perimeter bollards and fences, screening areas and access need to constantly seek out the potential attacker, screening their
control at entrances will deter most attackers from choosing that surroundings for suspects and irregularities. This will enable the
building as a target. security deployment to potentially detect the terrorists prior to an
impending attack. Even if the terrorists are not detected before
A reputation for tight, effective security deployment can be created they attack, the pro-active mindset will enable the guards to shift
both by advertising past successes in foiling real and simulated from routine to emergency mode faster.
attacks and by using propaganda (e.g. newspaper articles that
@*:*@,
:@
,
II. A pro-active deployment – The security deployment
must be outward-reaching and its various sensors must be
Deterrence helps prevent attacks in their planning stage and thus directed to detecting possible approaching threats. The practical
should be an essential component of every security plan. application of this type of deployment is the positioning of
perimeter guards and the direction of CCTV coverage at possible
In the case of hotels, deterrence can be achieved by: terrorist deployment areas.
I. Building physical protection elements at the perimeter III. A pro-active command – The security management
line and entrances including access control and gates (even if must lead the pro-active efforts. Security managers must be
they are only deployed during times of high alert). trained as commanders, leading their security unit by example.
Security commanders must be available to their team at all times
II. Deployment of robust technical security measures (equipped with a mobile radio), carry arms (if the unit is armed),
such as CCTV and alarm systems throughout the hotel and its q@
J:*:,,
perimeter.
IV. Pro-active specialised training – The security guards
III. The deployment of uniformed security personnel who will and commanders must be trained in the various skills that will
perform checks at the hotel’s entrances. enable them to detect terrorists and pre-attack reconnaissance.
On the other hand, security guards will usually be passive to their A hotel’s main entrance is usually a busy area, crowded with
surroundings and only once an incident has occurred or been guests going into and out of the hotel, and it hosts relatively large
reported will they move into an active mode. Analysis of terrorist concentrations of luggage waiting to be taken into the hotel or
attacks in recent years shows that the passive nature of some to be loaded onto out-going vehicles. A hotel’s main entrances
security operations have contributed to their failure in preventing is usually characterised by a relatively vulnerable structure, with
and defeating attacks. large openings and usually includes a large glass façade that
enables visitors and people walking by to look into the hotel’s
lobby and reception areas. Such entrances are also usually
accessible by vehicles which make them both attractive and
vulnerable to VBIED attacks.
Page 126
When planning the security deployment for hotels in Singapore This external security presence should have the means and
it is important to note that during normal periods the threat level
q J
J J *
*,
in Singapore is relatively low and thus the deployment of certain include:
noticeable security measures that would be utilised in hotels
in higher risk countries is not warranted. One must remember, I. `
@
q,
however, that given the deterrent role of the security and
protection elements, the hotel industry in Singapore needs to be II. `
@
,
,,
@[
prepared for a rise in threat levels, which may occur at any time. intelligence (“recce”)
Preparations for such a rise in threat levels may take time and III. Deterring potential attacks
thus the industry must prepare itself in advance for making the
necessary increase in its security deployment’s strength. IV. Providing advanced warning and reporting possible
approaching threats
These preparations should include:
V. Providing the initial armed response to attacks
I. The installation of retractable barriers (US DOS K4 originating both inside and outside the hotel.
standard or equivalent ASTM F2656-07 or UK BSI PAS68:2007
standard13) that would remain open but could be closed in times b) Technological Security Measures
of heightened threat.
The technological security measures deployed on the hotel’s
II. Acquiring the necessary security equipment (e.g. X-ray perimeter needs to complement and support the human security
machines and explosive material detectors). measures. The technological measures must ensure that:
III. Preparing the necessary infrastructure for the I. Vehicles and people wishing to enter the hotel are only
deployment of the security equipment (designing the area to able to do so through the protected screening posts.
carry the equipment’s load, laying electricity cables, allocating the
necessary space at the relevant locations). II. Critical areas not covered by human security presence
can be viewed from afar using CCTV or other measures
IV. Training the security staff with the necessary skills (e.g. ncluding detectors to alert the guards of an intrusion.
correct use of technological screening equipment, pedestrian and
^J,*@
q, III. Any breach of the perimeter security will raise an alarm
that will in turn allow the security deployment to react
*,:@@JJ
,
a) Security Guards
It is important to note that the security measures employed
During periods of heightened threat or in any situations where it on a hotel’s perimeter need not be obvious or make the hotel
may be deemed necessary, a manned outer security perimeter to resemble a fortress. Vehicle barriers can be designed as
for the hotel may need to be created. In certain situations based decorative planters or attractive railings, CCTV cameras can be
on threat assessments, the Singapore Police Force may deploy placed out of sight, hotel security personnel can be dressed in
resources, if they deem it to be necessary, for this purpose or may hotel uniforms, thus blending into the environment.
require hotels to put in place the necessary security guards.
The perimeter security should consist of at least two armed 4. ACCESS CONTROL
guards who should be stationed at the entrance and the exit to
the hotel driveway on a 24 hour basis. These guards should be A policy of relatively free access is vital for a hotel’s regular
responsible for stopping an attack before the assailants reach the operation and especially to the operation of restaurants, bars and
hotel premises. other function facilities.
The details of suspicious guests or staff may be sent to the All incoming packages should be screened using X-Ray and
Singapore Police Force for checks and follow-up actions (if explosive detectors in a protected area away from the hotel’s
necessary). guests or main building structure.
Recommendations for normal threat levels: Hotels routinely receive large quantities of deliveries both in
volume and number. These deliveries might be used in order to
Hotels should employ visual screening of guests/patrons by
,,|@,
^^
JJ
,**
*:
J
,,q@
J,
qq:J
J
,*@
Recommendations for normal threat levels:
recommended for guards to make the visual screening more
effective in detecting the relevant threats. Designated time frames should be determined for each
delivery company.
Recommendations for elevated threat levels:
The hotel’s security must compile a list of approved delivery
It is recommended that hotels limit the number of open trucks and drivers.
access ways to their premises, and that all open entrances
will be monitored by security staff. J J@
J
*, q J q: *:
personnel before allowing delivery trucks to enter the hotel’s
J*:
J
JJ
,
loading bay area.
I. Visually screen pedestrians for indications of suspicious Delivery drivers and the deliveries themselves must be
behaviour. visually scanned by the hotel’s security,
II. Conduct a more thorough examination of suspects In order to enhance deterrence against terrorist attempts to
(using metal detectors, opening hand bags and discreetly
, |@,
^
J J
,
J
screening their luggage with an x-ray machine) in a more suspicious deliveries together with a small number of random
protected area or behind a protected movable shield. deliveries be checked using explosives trace detectors
(“sniffers”).
III. Conduct random checks in order to enhance deterrence.
Reccomendations for elevated threat levels:
Recommendations for high threat levels:
Delivery companies will be instructed to notify the hotel’s
It is recommended that hotels limit the number of open security in advance with the particulars of delivery driver’s
access ways to their premises, and that all open entrances and delivery vehicle’s registration numbers.
be monitored by security staff.
#*@@,J,,q,^J
*
J
*
Everyone wishing to enter the hotel should be checked with J , ,, J^
q ^
J J ,^:
metal detectors, in order to create deterrence and to ensure company and the ordering store, prior to entering the loading
the potential terrorist will be examined. bay area and being accepted by the hotel.
All luggage and handbags should be checked with an x-ray Reccomendations for high threat levels:
machine, suspected luggage should also be checked with
explosive detectors. All deliveries will be checked by explosives trace detection
devices.
An area must be allocated for suspicious luggage and people
and have protection elements and forced entry resistant
doors and windows.
Page 128
e. Vehicle Access
` ¦Jq,:
@
J
Vehicle access routes in the vicinity of the hotel usually exist for during routine and different types of emergencies.
three main reasons:
`` #*@@
I. To enable access to the hotel’s parking areas. responders while they are performing their respective
responsibilities.
II. To enable the parking of selected vehicles in front of the
hotel. III. Is robust, secure and resilient under routine and
emergency situations.
III. To allow vehicles to access the entrance for the purpose
of picking up or dropping off guests and their luggage. The basic requirements of a command and control room:
Recommendations for normal threat levels: I. Location – To be placed in the most secure and protected
part of the building with extra physical protection
Technical measures such as car barriers should be installed elements if needed. (See the guidelines for more
so that they can quickly be deployed during elevated and details).
high threat levels.
II. Operational Effectiveness – This is achieved mostly by
During normal threat levels, the hotel need not screen creating prioritisation of the alarm and CCTV system’s
^J,*,J@
* outputs.
for the hotel to do so).
III. Accurate alarm indications – This enables the Command
Recommendations for elevated threat levels: & Control Room operator to immediately understand
where the breach or event is and to receive an
Barriers, which should have been installed but kept in the immediate visual picture of it via CCTV.
open position, should now be deployed in order to allow the
hotel’s security staff to screen incoming vehicles and prevent `0
,,:
# @
suspected VBIEDs from entering the hotel driveway. Procedures) to be taken during each of the various
emergency situations that could arise. This enables the
#*:
J
*, q @
J ^: security staff to initiate an effective security response
^*,,:q:*
J
*@ to a variety of emergency situations quickly.
of vehicles wishing to enter.
V. Automated procedures such as automated alarms that
Suspicious vehicles need to be searched (inside the notify the different security forces involved in responding
passenger compartment, in the baggage compartment, to the incident. This should take some pressure off the
next to the engine and underneath the vehicle) as do their security control room staff.
occupants (using metal detectors). This should allow the
detection of weapons and IEDs before permitting them to VI. Direct connection or integration with the hotel’s
enter the hotel’s driveway. management systems that are considered critical or
security related. This should enable the security control
Recommendations for high threat levels: room staff to override or control these systems when the
situation requires.
All vehicles need to be searched (inside the passenger
compartment, in the baggage compartment, next to the VII. Protection and backup of all critical systems. This gives
engine and underneath the vehicle) as do their occupants the security systems resilience during emergency
(using metal detectors). situations in which the security control room may be
damaged. Provisions that allow for an off-site Command
Vehicles should not be permitted to park in parking spaces and Control centre are recommended.
located at the front of the hotels, and should also be kept
away from other vulnerable areas.
Page 129
The monitors to be observed in the security command room SAFE HAVENS AND ESCAPE ROUTES
need to be carefully selected in accordance with threat and risk
assessment. Additional monitors can be installed, but should only Safe havens
be operated in emergencies when the security control room staff
is bolstered by reinforcements. In many threat and emergency scenarios, the safest place
to be is in a safe haven within the building rather than trying
JJ990@,
:
^q
to escape. Typically, the safe haven room will be reinforced
incidents and exercises should also be taken into account. If an against forced entry and even equipped with bio-chemical
attack occurs or an alarm is set off, CCTV footage of the area can 9
,:
q,@
@,
*^^
q
be used to reconstruct events, recognize suspects, solve crimes attacks for long periods of time until help comes. In many
, ,
q
J * *, *: buildings it will be the “shelter room”.
responses. In order to accomplish all of this, CCTV footage has to
be stored for a period of time (30 days is recommended. Please Identifying and incorporating safe havens into the building’s
refer to section 8.7.3 of the guidelines for details). emergency planning is one of the main responsibilities of a
building’s security manager. The security manager needs to
give clear and simple instructions to the building’s occupants
6. EMERGENCY PLANS AND PROCEDURES regarding the use of these safe havens. These instructions
must include clear criteria that determine in which situations
Emergency procedures should cover modern terrorist attack the occupants must go to the safe havens. Safe havens are
scenarios such as: especially critical in situation whereby evacuation routes may
be inaccessible following a terror attack.
I. Armed assaults.
Emergency escape
II. Staggered attack comprising a combination of scenarios
(e.g. a VBIED explosion followed by an armed assault). Routes should be designed taking into consideration the
threats and risks estimated for the hotel according to possible
``` #*Jq:J
@
terror scenarios. Special care should be taken to ensure that
whilst they are dealing with the wounded. they do not pass through areas that are considered hazardous
in an emergency situation. The escape routes should be
IV. Attacks utilising unconventional weapons (dispersion of planned in accordance with and in coordination with both the
a chemical agent via the building’s ventilating systems). :
*,
Jq*,J
:@,
II. The responsibilities and duties of all employee groups It must be possible to initiate emergency and evacuation
(hotel security team, maintenance, front lobby staff, etc.) procedures immediately without having to await permission
during and after the emergency situation – a special from an administrative manager/executive. Seeking
focus should be put on assigning a team to help guests administrative permission to evacuate the building/installation
who cannot evacuate themselves. in life threatening situations is not advisable due to the
time constraint.
III. A clear chain of command at all stages of the attack.
CONCLUDING REMARKS
IV. Which local forces will provide immediate reinforcements?
The above appendix of general security guidelines for hotels
V. Who evacuates the guests and visitors?
provides generic recommendations for security solutions for
hotels that if implemented will enhance security levels. The
VI. Who will be responsible for reporting and to whom? Both
appendix includes many general recommendations according to
within and outside the hotels’ management structure.
the different security rings presented. The overarching concept
of the appendix, which will greatly facilitate the implementation of
VII. The position of emergency equipment and its functions.
the recommendations, is that by correctly preparing and training
J J
,
*: [
*
VIII. Safe havens and escape routes.
they will become a force multiplier in anti-terrorism preparedness.
Page 130
APPENDIX C
GENERAL SECURITY GUIDELINES FOR Shopping malls have certain characteristics that create a
J,,*:@
^
*
SHOPPING MALLS
measures:
INTRODUCTION
J:
@
J@*q,
In Singapore, both the booming tourist industry and the hot climate
combine to make our major shopping malls important centres for J: **,,: J^ *,@,
@
economic activity. The large and prosperous shopping malls,
hosting thousands of shoppers daily, can be seen as symbols J:**,,:*
^q:
*
*
of Singapore’s economic success. The impact of a major terror @
*
^J,
attack against one of these malls would be severe and would
probably cause serious damage to the country’s economy. J
©:@,¥^
J
J
An analysis of terror attacks in the modern era show that terrorist J: , *q
^
q
J ,
,
organisations have frequently targeted shopping malls in their foreign.
terror campaigns. In the terror campaign against Israel, which
began in September 2000, the Palestinian terror groups had J
,,JJª
J
attacked shopping malls in Israel’s cities, one example being can be used as places for concealing IED’s.
the attack which took place at the Sharon Shopping Mall in sea
side city of Netanya in December 2005. In this attack, a suicide J: *,,: ^ , *
J
bomber from the Palestinian Islamic Jihad detonated himself at and supplies.
the entrance to the mall after his entrance was blocked by security
*J
Jq
q*@ J: J^ ,
q, , @,,:
in their food halls and in areas that hold clothing).
The IRA had also targeted shopping malls and commercial
centres in the past with the VBIED attack against the shopping J:**,,:J^,
J
centre in Manchester on the 15th June 1996 being the most attract customers).
prominent example. In this attack, over 200 people were injured
despite the warning given by the IRA close to detonation. J: @,
: ^: , *q
@
temporary staff including a security force made up
Another terror organisation that had attacked shopping malls was usually of both uniformed guards and plainclothes store
the Kurdish PKK. In an attack at a mall in Istanbul in March 1999, detectives.
J
q
qJJ
@@,,,,$"
people in the attack. The Abu Saif organisation had attacked malls JJJ@*,,:
in the Philippines and the ETA had planted bombs in department ,J
*
JJ
stores in Spain. halls.
Creating a secure environment in and around shopping #*:@,
:
,,J
*,q|q,qq,
malls has a commercial value. adapt to different threat levels. The model presented below offers
a system for transferring protection assets from crime prevention
to anti-terrorism according to threat levels. The transfer will be
q
J @
@,
: *
J
levels rise, so more of the shopping mall’s security assets are
allocated to anti-terrorism functions and positioning.
Page 131
SECURITY RINGS
It is important to note that shifting a guard or plainclothes store
detective from crime prevention mode to anti-terrorism mode
1. DETERRENCE
does not necessarily mean that the crime prevention level will be
lowered. In some cases the new role may make the guard more Deterrence theory explores the conditions under which one player
alert and dynamic and therefore improve the effectiveness of the can deter another opposing player from taking an action that is
crime prevention. A store detective with experience at identifying
:
J
@,: '
the suspicious behaviour of shoplifters will be able to adapt very involves one of two aspects or a combination of both:
well to identifying other possible suspects provided he is equipped
with the necessary tools and training. I. The threat to use force in response to an undesired
action – this is aimed at making the opponent evaluate the
projected losses caused by the violent response to be greater
than the projected gains from the actions he wishes to perform.
Page 132
2. PRO-ACTIVE SECURITY 3. PERIMETER SECURITY
` J
,
[
@
|@ @
^ J The majority of terrorist attacks against shopping malls have
the defender is usually in an inferior position in relation to the been conducted by placing an IED inside the mall or by trying
attacking terrorists. This is primarily as a result of the routine
,*q
q
,:J@
nature of security work combined with the relatively low number of a dynamic, pro-active perimeter security deployment cannot
of attacks taking place, that tend to make security deployment be underestimated. One of the principles of security is the ability
defensive and reactive. to detect a suspected attacker as far away from the building as
possible or at a point where the attacker would cause the least
The attacker has the advantage of initiative on his side. He is able amount of damage. One of the means to do this is by employing
to choose the time, place and modus operandi of the attack. He external security rings.
can abort the attack or postpone the attack if he believes that he
is at a disadvantage. Another major threat relating to the building perimeter is the easy
approach of a potential VBIED to the external walls and entrance
On the other hand, a security guard will usually be passive to his and ramming through them to enter the main building. This threat
surroundings and only once an incident has occurred or been may have catastrophic implications on the mall if carried out.
reported will he move into an active mode. Analysis of terrorist The main principle in mitigating consequences in such an event
attacks in recent years show that the passive nature of some is by determining the vulnerable locations for such threats and
security operations have contributed to their failure in preventing preventing the attack from being carried out in a catastrophic
and defeating attacks. manner (assuming complete prevention is not always possible).
This would be done usually by installing a physical barrier to
The solution to the apparent inferiority of the defending force can prevent the vehicle from approaching a critical proximity and
be found in its inherent advantages. The security force can usually installing blast mitigation elements on glass facades.
afford better training for its personnel. The security team must be
able to take advantage of the fact it is operating on home ground; Perimeter security is a critical external ring and when not
this enables them to have an intimate and detailed knowledge effectively realised it may cause a serious vulnerability
of their terrain which can provide them with tactical superiority in a building’s security deployment. This is the kind of
during the adversary’s intelligence gathering as well as during an vulnerability to which terrorism is attracted.
attack.
When planning perimeter security for shopping malls, special
emphasis must be given to the mall’s various entrances and exits
Pro-active security is a tool for enhancing the security unit’s
and especially to the main entrance.
advantages while minimising those of the potential attacker. It is
made up of:
A mall’s main entrance is usually the busiest and most crowded
entrance often positioned facing the main road, packed with
I. A PRO-ACTIVE MINDSET - the security guards must
shoppers entering and exiting the mall. A shopping mall’s
be educated to have a “hunter mentality”, that is to say that they
main entrance is usually characterised by relatively vulnerable
need to constantly seek out the potential attacker, screening
construction; large openings, a large glass façade that enables
their surroundings for suspects and irregularities. This will enable
both shoppers and passers-by to view the merchandise on
the security deployment to potentially detect the terrorists prior
display inside the mall. These main entrances are also usually
to an impending attack. Even if the terrorists are not detected
accessible by vehicles to allow private car and taxi drop-off and
before they attack, the pro-active mindset will enable the guards
pick-up of shoppers, a feature that makes them very attractive
a smoother shift from routine to emergency mode.
and vulnerable to VBIED attacks.
II. A PRO-ACTIVE DEPLOYMENT – the security
Preparations for such a rise in threat levels may take time and
deployment must be outward facing; its various sensors must be
thus the industry must prepare itself in advance for making the
directed to detecting possible approaching threats. The practical
necessary increase in its security deployment’s strength.
application of this type of deployment is the positioning of
perimeter guards and the direction of CCTV coverage at possible
These preparations should include:
terrorist deployment areas.
I. The installation of retractable barriers (US DOS K4
III. A PRO-ACTIVE COMMAND – the security management
standard or equivalent ASTM F2656-07 or UK BSI PAS68:2007
must lead the pro-active efforts. Security managers must be
standard14) that would remain open but could be closed in times
trained as commanders, leading their security unit by example.
of heightened threat.
Security commanders must be available to their team at all times
(equipped with a mobile radio), carry arms, if the unit is an armed
II. Acquiring the necessary security equipment (e.g. X-ray
q@
J:*:,,
machines and explosive material detectors).
IV. PRO-ACTIVE SPECIALISED TRAINING – the security
III. Preparing the necessary infrastructure for the
guards and commanders must receive training in the various
deployment of the security equipment (designing the area to
skills that will enable them to detect terrorists and pre-attack
carry the equipment’s load, laying electricity cables, allocating the
reconnaissance. Two important measures in achieving and
necessary space at the relevant locations).
maintaining a pro-active security operation are pro-active minded
audits and “red teaming” exercises. These should be focused
IV. Training the security staff with the necessary skills (e.g.
on testing and assuring pro-active security measures. They help
correct use of technological screening equipment, pedestrian and
to evaluate the level of preparedness and pro-activeness of the
^J,*@
q,
tested security deployment. They also help to focus the security
unit on the need for applying pro-active security, by showing that
the security regulator puts an emphasis on these measures.
14
US Department of State (DoS) SD-STD-02.01 ‘Vehicle Crash Testing of
Perimeter Barriers and Gates, Revision A, dated March 2003’, or ASTM
2656-07 ‘Standard Test Method for Vehicle Crash Testing of Perimeter
#!%>>"#@
0J,#*:
Page 133
General recommendations for normal threat levels: a. Walk-in Shoppers’ Screening
Due to the very large numbers of people in Singapore’s General recommendations for normal threat levels:
major shopping malls and their attractiveness as targets for
terrorism, there should be an armed and pro-active security A preliminary visual screening of people entering the mall
presence even during times of normal threat (2-3 armed is most effective if carried out at the various entrances.
guards) on the perimeter of these malls. #*@
q
,JJJ
*,
be countered or neutralised before they enter the building.
This external security presence should have the means and Some of the screening can be done by exterior patrols and
J
JJ*J
*, some by guards posted at or near the entrances. Special
include: attention should be given to people such as individuals
carrying large bags, wearing heavy clothing like suits or coats
` `
@
q, or who stand out as unusual or odd.
`` `
@
,
,,
@[
reconnaissance Suspects will be physically screened using metal detectors
III. Deterring potential attacks and their handbags should be searched visually or screened
IV. Providing advanced warning and reporting using a hand-held metal detector.
possible approaching threats
V. Responding to alerts given from the command Relevant screening equipment should be available.
post
VI. Providing the initial security response to the At elevated threat levels:
attack
Security guards need to be posted at each entrance to
General recommendations for elevated threat levels: visually screen all people entering the mall. Any suspects
and a pre-determined percentage of random individuals will
A minimum number (to be determined) of randomly picked be physically screened using hand-held metal detectors and
shoppers need to be checked per hour by the perimeter their bags will be visually searched.
*:
J @
@
@,
*@J*,, Closing some of the less busy entrances should be considered
to enable a concentration of effort for access control at the
In addition to the armed exterior presence at the entrances, open entrances if resources are limited.
frequent patrols (two per hour) should be operated around
the perimeter. At high threat levels:
4. ACCESS CONTROL
Access control deals with authorisation and rules by which
vehicles, personnel and goods may enter a building. The reason
access control is such an important security feature is that in most
cases, an attack that takes place inside will cause much more
damage and casualties than an attack which occurs outside. For
this reason it is recommended that a shopping mall’s security
unit deploys a certain level of access control measures at normal
threat levels which will increase with a rise in the threat level.
Page 134
Security guards need to be posted at every entrance of the General recommendations for elevated threat levels:
shopping malls except those entrances which are behind the
crowd control barriers. Delivery companies should be instructed to notify the shopping
malls’ security departments in advance with the particulars of
An elevated guard post should be constructed and manned the driver’s and the vehicle’s registration numbers.
by an armed guard. The position will enable tactical control
over the areas around and beyond the crowd control barriers. #*@@, JJ ,^ J
*
J
*
J , ,, J^
q ^
J J ,^:
All people wishing to enter the shopping malls will be company and the ordering store, prior to entry.
physically screened and their bags will be searched.
General recommendations for high threat levels:
b. Screening of Deliveries Delivery companies will be instructed to deliver supplies at
|J
*JJ,,,
J@*q,
*
Major shopping malls receive vast quantities of merchandise and the peak hours.
supplies each day. The delivery of merchandise and supplies can
be used as a platform for bringing VBIED’s or large IED’s into a All deliveries will be checked by explosives trace detection
J
@@ ,,
,
* J J ,^
q devices.
screened according to the threat level.
c. Vehicle Access
General recommendations for normal threat levels:
Major shopping malls in Singapore often provide car parking
space for their clients in the form of underground or multi-storey
At normal threat levels three basic anti-theft and fraud measures car parks within the shopping mall building. The threat of a
commonly used are adequate for dealing with the VBIED and IED VBIED entering a mall’s car park poses a serious threat. These
threats. These three measures are: threats are presented in the main body of the guidelines. This
appendix assumes that such a threat exists and relates to it with
I. Screening of the documentation of incoming @
*:*
JJ,^,J
delivery vehicles in order to make sure that the delivery aim of these recommended security screening measures is to
was ordered by a tenant of the shopping mall.
:
,0`
J
@@,,
car park. The greater the vulnerability to a mall from a particular
`` 0
JJ,^
q car park, the greater the importance of the screening measures.
unloaded from the trucks at the loading docks matches
General recommendations for normal threat levels:
the details of the delivery as is written on the delivery
papers. The match should be according to number of All vehicles should be visually screened at the entrance to
parcels and their size. the car park driveway for suspicious people or suspected
VBIED’s.
III. Drivers that are not regulars or drivers that
seem suspicious should be questioned by the security Suspected vehicles and people will be directed to a
designated15@
Jq:*:
Page 135
The security control room design must allow it to function as an VIII. Protection and backup of all critical systems – this
effective tool for managing the security of the mall and emergency is meant to allow for the security systems’ resilience during
situations. This can only be achieved if the security control room: emergency situations in which the security control room will be
damaged.
¦ , @*
J *
J ,, q
J
routine and emergency situations in order to assist the IX. Access control for the control room itself, preventing un-
decision makers to make the right decisions based on authorised entry.
facts.
The formulation of the command and control room should
9
^
J,,
J@
, correspond with these tasks.
positioned in it to keep a high level of alertness without
CCTV Monitoring
^
16 .
Normally there is a tendency in shopping mall security planning
¦Jq,:
@
J
to design CCTV systems for crime prevention and insurance
during routine and different types of breaches and
17 reasons. Security managers should not overlook the importance
emergencies .
of deploying anti-terror CCTV coverage throughout the mall and
@
J@
@,
:
¦Jq,:
@
,:q
J
section 8.7 of the guidelines).
and visitors in emergency situations and monitor the
evacuation of the people if necessary. It is important to note when planning the CCTV monitoring
scheme that the security personnel operating the security control
#*@@
room have a limit to the number of images they can monitor at
responders while they are performing their respective any one time.
responsibilities.
In order to avoid “overloading” the security control room operators
`
q* * , *
* with information and thus making the CCTV monitoring less
emergency situations. effective, it is recommended that each operator cover 4 to 8
images, no less than 10” wide each.
The basic requirements of a security command and control
room are: The monitors to be observed in the security command room
need to be carefully selected in accordance with threat and
I. Operational Effectiveness – This is achieved mostly by risk assessment, time of day, and different activities at hand.
creating prioritisation of the alarm and CCTV systems’ outputs Additional monitors can be installed, but should only be operated
,^*,
*q,
©*
¥q in emergencies when the security control room staff is bolstered
by reinforcements. Monitors that are meant to assist in access
II. Accurate alarm indications – This is meant to enable the control in controlled areas should be dedicated.
C&CR operator to immediately understand where the breach or
event is and to receive an immediate visual picture of it via CCTV. When designing the CCTV deployment and coverage plan, we
,
J^
*J*
q
```
,,:
q
J , and exercises. If an attack occurs or an alarm is set off, CCTV
to be taken during each of the various routine and emergency footage of the area can be used to reconstruct events, recognise
situations that could arise. This enables the security staff to suspects, solve crimes and learn lessons from both successful
initiate an effective security response to a variety of emergency *:@
`
@,J,,
J
situations in a relatively short time. CCTV footage has to be stored for a period of time (28 days is
recommended. Please refer to section 8.7.3 of the guidelines for
IV. A log book which supports the investigation of incidents details).
and gives a clear picture of what happened and the actions taken.
It should be noted that CCTV coverage also plays a key role in
V. Recording all data received by the systems (CCTV, creating deterrence.
alarm, access control) for post-incident investigation.
6. EMERGENCY PLANS AND PROCEDURES
VI. Automated procedures such as automated alarms that Terror attacks are lethal, immediate, develop at a rapid rate
notify the different security forces involved in responding to the and usually occur with no prior warning, leading to possible
incident – this is meant to take some pressure off the security catastrophic results. In these cases, there is no time for planning
control room staff. the response, reporting and requesting orders. Time is critical,
many lives are at stake and the security response must be
VII. Direct connection or integration with the shopping mall’s immediate, automatic and pre-planned. This is achieved through
management systems that are considered critical or security the emergency and evacuation plan.
related – this is meant to enable the security control room staff
to override or control these systems when the situation requires. In the case of a crowded mall, the consequences of an attack can
The most critical system that must be controlled by the control q
*,:q:JJ
*
J:
room is the public address system. of the crowd. Furthermore, the chaos can be created even if the
situation is only a scare and not an actual attack. The purpose
of the emergency plan is to save lives, minimise damage, ensure
continuity in the functioning of critical systems and accelerate
recovery.
16
Prioritizing inputs received from security cameras and connecting them
to an alarming system will enable only a few monitors to be viewed on a Shopping malls that are interconnected with links to other malls
constant basis. or MRT stations may share an inter-dependent risk and should
collaborate with these linked facilities on the relevant security
17
In many cases security and safety systems are connected and interact measures and contingency response plans.
and therefore it is necessary that the command post have the capabilities
to operate both.
Page 136
Emergency procedures should cover modern terrorist attack SAFE HAVENS AND ESCAPE ROUTES
scenarios such as:
Safe havens @[
J,
^:
*@
*
q installation which provide certain levels of physical protection for
the residents from threats during possible and actual emergency
*, situations. In many threat and emergency scenarios, the safest
place to be is in a safe haven within the building rather than trying
#
@
q
to escape. These should be considered in a mall as well, although
(e.g. a VBIED explosion followed by an armed assault).
*, q
*,
,* J J q
emergency plan because the concept is against the nature of a
#*Jq:J
@
crowd.
whilst they are dealing with the wounded.
Identifying and incorporating safe havens into the buildings
*,*
^
,@
@
emergency planning is one of the main responsibilities of a
a chemical agent via the building’s ventilating systems). shopping mall’s security manager. The security manager needs to
give clear and simple instructions to the mall’s shoppers regarding
?"
*
the use of these safe havens. These instructions must include
the following: clear criteria that determines in which situations the shoppers
must go to the safe havens. Safe havens are especially critical
J
,,qJ
@
¨ in a situation whereby evacuation routes may be inaccessible
following a terror attack.
J,,qJ
J
¨
Emergency escape routes should be designed taking into
J@
q,*
,,@,
:
*@ consideration the threats and risks estimated for the shopping
(management, shopping mall security team, mall according to possible terror scenarios. Special care should
maintenance, sales people etc.) during and after the be taken to ensure that they do not pass through areas that are
emergency situation – a special focus should be put on considered hazardous in an emergency situation. The escape
assigning a team to assist shoppers in need. routes should be planned in accordance with and in coordination
Jq
JJ :
*,
J,,J
q
, J
,,
J
The guiding principle for determining whether to activate an
JJ,
,
,,@
^
¨ escape plan is simple and directed by simple instructions sounded
clearly in all areas of the mall in all major languages spoken in the
J
^*JJ
@@¨ mall. Evacuation is ordered when the danger to the occupants is
18 19
greater within the mall/complex than it is outside it.
q^
* and required @
*@
relevant scenarios. Emergency and evacuation procedures must be allowed to be
initiated immediately without having to await permission from
J
,,q@
q,
@
J
q
J an administrative manager/executive. Seeking administrative
within and outside the mall’s management structure? permission to evacuate the mall in life threatening situations is
not advisable due to the time constraint.
J@
:*@ *
Concluding Remarks
# J^
,^,:@
The above appendix of general security guidelines for shopping
malls provides generic recommendations for security solutions for
shopping malls that if implemented will enhance security levels.
The appendix includes many general recommendations according
to the different security rings presented. The overarching concept
of the appendix, which will greatly facilitate the implementation of
the recommendations, is that by correctly preparing and training
J J
@@ ,,
*: [
measures, they will become a force multiplier in anti-terrorism
preparedness.
18
According to the existing signs throughout the mall
19
According to the threat location and the exit locations
Page 137