MCE123 Logo

This website uses Cookies, and by using the website, you accept our Terms of Service, Privacy Policy, and other applicable policies set by our Legal Department.

You agree to stay up to date on any changes to our legal policies, as they are posted, by visiting our Legal Department. For your viewing convenience, we are not required to notify you again.

MCE123 - Technology Development

School Security Systems v1.0

This document pertains to a multi-faceted school security system, that could be installed to protect high-value assets, such as future Presidential candidates, while maintaining low observability of security personnel due to highly sophisticated technological security that is highly resistant to different levels, or layers, of security breaches.

Building Construction Methods

  • Fire Proof – fire suppressant systems.

  • Bullet Proof – all doors, windows, and walls are made bullet-proof, either by layering bullet-resistant or bullet-proof materials, i.e. panels in the doors, bullet-resistant layers of glass with plexiglass

  • Bomb Proof – chemical sensors at all major entrances and exits into the interior buildings, or at perimeter fences around the schools. Solid 4ft concrete walls, or 4ft brick walls with no spaces in between the layers, with rebar.

  • Unauthorized Vehicle Proof - resistant to car bombings and terrorism-related uses of vehicles – security guards that raise and lower based on positive vehicle identification. As a car enters the exterior perimeter, it is scanned for its contents.

  • Perimeter and Building Lockdown Systems – a 130db alarm sounds, and all doors seal with electronic locks within 15-30 seconds, programmable. All windows are blinded. There are corridor security booths for the stranded that lock from the inside. Systems unlock the doors, windows, and turns off alarm only when Police and/or Military units respond. Maximum asset protection with multiple layers that lock at different intervals, and/or based on motion sensors and facial recognition of identified threat(s).

  • Access Security – facial recognition, biometric security, and ID card swipe with encrypted chip technology. Breach activates armed security guard. More than one threat auto-notifies Department of Homeland Security for rapid response units.

  • Modern High-Resolution Radiographic Imaging Screening – all backpacks, laptop bags, purses, water bottles, coffee cups are scanned and analyzed with AI. Potential information security breaches identified before they occur – i.e. hidden USB drives, small electronic transceivers. Bombs detected. Plastic explosives detected. Plastic weapons detected. Other weapons detected.

  • SCIF Rooms for Information Security Systems and Security Personnel, and also for any classes teaching Law Enforcement, Foreign Relations, Military Intelligence, etc.

Cyber-Security Methods

  • Mobile Device Monitoring – private cell phone tower with 2G / 3G / 4G / 4G LTE services that redirects all devices, monitors all incoming and outgoing communications for threats, sedition, etc. trunks all service through underground fiber optics.

  • WiFi Security – MAC Address locking with a unique encryption key for each system. No public keys. Access point denial systems that blocks communications on all insecure channels.

  • Backbone / Trunk Security – BGP routing with multi-layer security strategy, encryption between end points, detection of use of encryption – identification of encryption keys when they are transmitted / received, and stored for content analysis at OSI Layer 7

  • Anti DoS Technology – prevent takedowns of critical systems infrastructure

  • Communications Lockdown Mode – scramble all RF/VHF/UHF bands

Surveillance Systems Security Methods

  • All CCTV run by AI systems that identify all objects, moving or not, and categorize them based on potential threat level, including intent analysis, body language analysis, motion path analysis, noise analysis including voice recognition with universal translator

  • CCTV capable of low-light conditions, for night vision such as Deuterium gas light amplification and/or infrared light detection with high-powered infrared LEDs, including backup battery systems on each camera and the central control room

  • Intercom connected to DHS and/or Police Department to address threats

  • A small red light, or threat announcement / assessment system that turns on to different levels or colors based on the type of threat

Legal Security Methods

  • Authorization from Students and/or Parents to conduct searches through technology, including surveillance, for their security

  • Establishment of Ground Rules for Working, Studying, and Learning in a Surveillance-Aware School

These are just a few things that come to mind when thinking about how to secure a school, whether it be a school in the U.S. or a third-world country.

Also, see industrial mining security systems and technologies documentation from MCE123 Technology Development.

Intellectual Property Rights Management

This Intellectual Property is owned by MCE123 Technology Development. By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the Intellectual Property Rights Management agreement. Protection Status Site Protected by SiteLock