SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

It’s anchors away for Navy Base’s access control system

Contact company
Contact ChipER Technology Co. Ltd
icon Add as a preferred source Download PDF version

The munitions group at Maryland’s Naval Surface Warfare Center was in an access control quandary.  A Sign-in/out log had proved impractical and electronics were too expensive or too dangerous due to the potential of explosion.  The unlikely solution came from a nearby cow pasture.

Call it bovine intervention. That’s the best way to describe the solution ESTECH, an electronic security systems integrator located in Annandale, Va., selected to solve the access control quagmire served up by the munitions testing group within the U.S. Naval Surface Warfare Center in Indian Head, Md.  The installation’s environment demanded a creative approach because of the frequent handling of reactive substances and volatile chemicals.

Before the Navy made all the security experts they had enlisted walk the plank, ESTECH climbed aboard and righted the ship.  The company devised a solution based upon a most unorthodox impetus.  The result was a simple, efficient system that was also cost-effective.

Job Takes Dealer to Historic U.S. Site

Indian Head, the site of the Naval Surface Warfare Center, sits on a 3,500-acre peninsula in the Potomac River, 30 miles south of Washington, D.C., with a rich history of security concerns.  Nowadays, this secure government facility is the center for numerous core technical capabilities for the U.S. Navy.  The Indian Head Division is the largest employer in Charles County with more than 1,800 employees, 800 of which are scientists and engineers.

The base has a $1.6 billion plant asset value with more than 1,600 buildings on site.  Activities carried out at the Warfare Center include: research and development for surface warfare, fleet support for rocket, missile and gun propulsion, manufacturing technology for energetics, development, engineering, manufacturing and fleet support for cartridges, cartridge- and propellant-actuated devices, and aircrew propulsion escape systems. The facility’s most critical mission is navy-wide explosive safety engineering.

Integrator Earns a Reputation for Creativity ESTECH currently monitors approximately 500 accounts, primarily combination video surveillance and intrusion detection systems for federal law enforcement. Perhaps the most creative solution ESTECH has dreamt up was the one it implemented for the Warfare Center’s munitions testing group, which is responsible for conducting low-level testing of military explosives under development.

The level of security on the naval base is extremely high and exhaustive safety procedures must be followed due to the highly volatile explosives being tested.  Each visitor, regardless of rank or security clearance, must receive an intensive hazard control briefing and is escorted at all times.  No transmitting devices — including two-way radios, car phones and electronic keys — are permitted on the base.  Firearms, cameras and smoking products are confiscated at the main gate and returned when the person leaves.  “The commander of the Military Police unit has been quoted as saying that ‘Safety is our highest priority. Security is twice as important,’” says Smith.

The munitions testing group’s extremely hazardous environment and the dangerous nature of the work require maximum external security and internal safety.  Workers must wear respirators and protective clothing as well as be decontaminated as they enter and exit the laboratories.  Within the labs, each different compound has to be kept in its own locked container.

Previously, keys were signed in and out on a traditional sign-in log.  However, because it’s cumbersome to use a pen and paper while wearing protective clothing, the log was disregarded.  Keys ended up being either misplaced or lost.  Offcials at the center decided they wanted a system that offered the secure and convenient benefits of card access without interfering with or activating the base’s radio frequency-based (RF) detonation systems.  Such a system necessitated all components being triple-protected from any electronic short, which could set off an explosion.

Since card and reader technology typically uses RF transmissions, the facility’s access control needs required a unique approach.  The Warfare Center contacted several major electronic security companies in an attempt to purchase an intrinsically safe access control system for the application.  However, the only apparent viable solution was a cost-prohibitive one exceeding the department’s one-year budget involving six-dozen keypads and laboratory shut downs.

When ESTECH assessed the situation, seven employees were assigned to key management, manually locking and unlocking cabinets each workday - an extremely ineffcient regimen.  “Initially, we had no better suggestions to handle the problem than anyone else,” reveals Smith.  “But during a drive through the Virginia countryside, on the way to an estate installation, I noticed cows by the roadside wearing large, brightly numbered tags.  That was the answer! Each cow was a key and the meadow gate was the reader.”

Since a proximity key tag is a passive electronic device, it does not pose an explosive hazard. ESTECH simply attached an HID proximity tag with the key on a cow-tag key ring.  The solution turned out to be quite simple and very cost-effective.  It consisted of two HID ProxPro card readers, several Pokey II key-chains and ProxPro II card proximity tags, and Ademco’s PassPoint operating system.  The assembly of an access control key box and a drop box took just a few hours and were fully functional in less than an hour.

Before an employee enters the laboratory, he or she passes his or her proximity tag, which is attached to the breast pocket of their protective suit, by the reader.  This registers the specific keys out to that worker, noting the time and date read.  At the conclusion of the worker’s shift, the keys are put into a drop box, where another reader records them. Before the shift ends, all the keys can be accounted for.

“ESTECH has relied on HID products in the past to install systems in secure facilities,” says Smith.  “To date, the HID products have performed ?awlessly.  In this instance, reliability was as important as safety.” Most importantly, it poses no threat to the well-being of the employees.

More on HID

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Biometrics
  • Electronic access control
  • Related categories
  • Access control systems & kits
  • Access control readers
  • Access control cards/ tags/ fobs
Related white papers
One system, one card

One system, one card

Download
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Related articles
TDSi by Hirsch: Reinventing UK access control

TDSi by Hirsch: Reinventing UK access control

HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

Securitas Technology acquires Sonitrol Ft. Lauderdale

Securitas Technology acquires Sonitrol Ft. Lauderdale

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Case studies
About this page

"It’s anchors away for Navy Base’s access control system" is one of 9201 in-depth security application and installation case studies featured in this section. Visit regularly for the latest updates on use cases, installations and deployments of security products from ChipER Technology Co. Ltd.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec