Technology Development Projects

School Security Systems v1.0

 

This document pertains to a multi-faceted school security system, that could be installed to protect high-value assets, such as future Presidential candidates, while maintaining low observability of security personnel due to highly sophisticated technological security that is highly resistant to different levels, or layers, of security breaches.

 

Building Construction Methods

 

  • Fire Proof – fire suppressant systems.

  • Bullet Proof – all doors, windows, and walls are made bullet-proof, either by layering bullet-resistant or bullet-proof materials, i.e. panels in the doors, bullet-resistant layers of glass with plexiglass

  • Bomb Proof – chemical sensors at all major entrances and exits into the interior buildings, or at perimeter fences around the schools. Solid 4ft concrete walls, or 4ft brick walls with no spaces in between the layers, with rebar.

  • Unauthorized Vehicle Proof - resistant to car bombings and terrorism-related uses of vehicles – security guards that raise and lower based on positive vehicle identification. As a car enters the exterior perimeter, it is scanned for its contents.

  • Perimeter and Building Lockdown Systems – a 130db alarm sounds, and all doors seal with electronic locks within 15-30 seconds, programmable. All windows are blinded. There are corridor security booths for the stranded that lock from the inside. Systems unlock the doors, windows, and turns off alarm only when Police and/or Military units respond. Maximum asset protection with multiple layers that lock at different intervals, and/or based on motion sensors and facial recognition of identified threat(s).

  • Access Security – facial recognition, biometric security, and ID card swipe with encrypted chip technology. Breach activates armed security guard. More than one threat auto-notifies Department of Homeland Security for rapid response units.

  • Modern High-Resolution Radiographic Imaging Screening – all backpacks, laptop bags, purses, water bottles, coffee cups are scanned and analyzed with AI. Potential information security breaches identified before they occur – i.e. hidden USB drives, small electronic transceivers. Bombs detected. Plastic explosives detected. Plastic weapons detected. Other weapons detected.

  • SCIF Rooms for Information Security Systems and Security Personnel, and also for any classes teaching Law Enforcement, Foreign Relations, Military Intelligence, etc.

 

 

 

Cyber-Security Methods

 

  • Mobile Device Monitoring – private cell phone tower with 2G / 3G / 4G / 4G LTE services that redirects all devices, monitors all incoming and outgoing communications for threats, sedition, etc. trunks all service through underground fiber optics.

  • WiFi Security – MAC Address locking with a unique encryption key for each system. No public keys. Access point denial systems that blocks communications on all insecure channels.

  • Backbone / Trunk Security – BGP routing with multi-layer security strategy, encryption between end points, detection of use of encryption – identification of encryption keys when they are transmitted / received, and stored for content analysis at OSI Layer 7

  • Anti DoS Technology – prevent takedowns of critical systems infrastructure

  • Communications Lockdown Mode – scramble all RF/VHF/UHF bands

 

Surveillance Systems Security Methods

 

  • All CCTV run by AI systems that identify all objects, moving or not, and categorize them based on potential threat level, including intent analysis, body language analysis, motion path analysis, noise analysis including voice recognition with universal translator

  • CCTV capable of low-light conditions, for night vision such as Deuterium gas light amplification and/or infrared light detection with high-powered infrared LEDs, including backup battery systems on each camera and the central control room

  • Intercom connected to DHS and/or Police Department to address threats

  • A small red light, or threat announcement / assessment system that turns on to different levels or colors based on the type of threat

 

Legal Security Methods

 

  • Authorization from Students and/or Parents to conduct searches through technology, including surveillance, for their security

  • Establishment of Ground Rules for Working, Studying, and Learning in a Surveillance-Aware School

 

 

 

These are just a few things that come to mind when thinking about how to secure a school, whether it be a school in the U.S. or a third-world country.

 

Also, see industrial mining security systems and technologies documentation from MCE123 Technology Development.

 

Educational Classroom Recording System (EDURSYS)

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.

This document explains a system of recording the multiple angles of a classroom’s educational lecture by a professor, and how to export the multiple views into a video file format that can show all the different views such as the white board, the overhead / projector screen, the computer view, and the wide-angle view of the entire classroom, including microphones and video cameras at multiple locations throughout the classroom.

Educational Monitoring System (EDUMSYS)

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.

This information pertains to an educational monitoring system, for the purpose of monitoring all information that pertains to schools, students, and teachers, for the purpose of ensuring that persons are not clandestinely targeting other persons outside of the school within public systems such as law enforcement, legal discovery, and the use of telecommunications or any other process of communications to disseminate information to third parties that are not part of the specific classroom.

Justification:

Students that focus on their school work and remain isolated for prolonged timeframes, including conditions of the economy that keep the students from moving forward towards their career, has a potential issue of being targeted by other students based on the amount of work that students work at home, such that the students do not socialize in public.

Characteristics of Potential Conflicts:

Students of various professional backgrounds and education levels may clash in the professional environments, due to one student having a greater amount of knowledge about topics than another, or in rare cases a student is targeted for the purpose of the third parties attempting to damage the student.

In rare cases, a student may have a greater amount of knowledge than the instructors about other topics, and if the instructors utilize legal discovery, the instructors have the potential capability of damaging the student.

Socialization decreases as the amount of academic and intellectual work increases, therefore the logic behind the justification of a lack of social responsibility of the student results in the student increasing the amount of academic and intellectual work. This is the equivalence of third parties criminalizing the student for competitive purposes, or there may be criminal purposes behind the targeting of the student.

Students and/or teachers discuss information pertaining to a classroom environment outside of the classroom environment, beyond the reasonable discussion of classroom materials and discussions that pertain to the classroom. In some cases, this can lead to third parties creating conspiracy and/or information misrepresented in their own perspective, such that the dissemination of the classroom from outside the classroom polarizes the public comparatively to the classroom, based on information that was taken from the classroom. The same applies to all information that pertains to attendance at a school, while each class is a separate class, unless if a correlation to referencing information that is not officially part of the class such as referring to information in another class makes reasonable sense.

Limitations of Internal Perception of Conspiracy by Federal Government:

Students, faculty, and other persons within an educational institution should not feel as though the presence of Federal Government computer systems establishes any type of conspiracy.

If there is ever a reference to “they”, such that the reference suggests a conspiracy by the government, such as persons within the government watching them online – this type of conspiracy implication does not correlate to Federal Government monitoring systems. Additionally, the activities that correspond to such activities should not be discussed with the public for purposes of avoiding conspiracy through the conspiracy of discussing the information. Any activities that suggest that there is active monitoring could either be reported to the IT staff at the school to keep a record, or internal processes of monitoring the activities without disclosing the information to determine where the activities originate from without seeking out the answers, or seeking help from Federal Law Enforcement to monitor the activities. There are requirements to cooperate with Federal Law Enforcement if the information pertains to an active case, such that the process may not target specific individuals in the public, in the classroom, or in any other way suggest that the government is causing the activities.

Possible Technological Characteristics:

Indirect computerized monitoring of online chat rooms and message boards

Indirect computerized monitoring of telephone calls, if there was information that suggested a correlation

Indirect computerized monitoring of classroom activities, including the use of satellites that can detect audio, video, and the presence of organizational structures within the discussions of the classroom

Indirect computerized monitoring of discussions with government agencies and other entities if the discussions relate to the school and/or school works in any way

Primary Purpose:

The purpose of the technology would be for the purpose of monitoring school activities, in order to determine if there is targeting based on political / sociological patterns that are common to dissemination of information that is protected under Federal Privacy Rights.


© Copyright MCE123 (SM) 1999-2018, All Rights Reserved.

Privacy Policy | Contact Us

DMCA.com Protection Status