Physical Security Guide
Physical Security Guide
to Physical Security
A guide to getting started with
access control
www.getkisi.com
What is physical security?
Physical security has traditionally been viewed as an unsexy and tedious topic that few
want to tackle; however, everyone knows that safety and security must be adequately
addressed. From talking to endless lines of hardware store reps about installing door
locks, to antiquated, dystopian visions of bored security guards in rooms with dozens of
CCTV monitors— the label of physical security doesn’t necessarily inspire passion.
We’re here to tell you that it doesn’t have to be that way. With cutting-edge technology
and the Internet of Things revolution, the world of physical security has drastically
changed—making your physical office a safe space has never been easier.
If you’re new to the world of
physical access control, you
might have some questions:
Components
What are the pieces of
Why Access Control
an access control
system and how does it Why do people
work? choose access
control?
Is it absolutely necessary to learn about access control yourself? No, definitely not;
however, it will save you a lot of time when your project is underway and people start
speaking jargon that freaks you out—especially if it’s past the construction deadline, or
your employees are arriving on Monday to an office with no access control system.
****
Introduction to
Access Control Systems
If you carry an access card, ID badge, or keyfob then your office already uses an access
control system. But how does it really work? It's difficult to imagine, since most people
have never seen the system. When initially thinking about it, most people believe it’s
just a card reader on the wall.
In reality, there are a few parts behind-the-scenes that make the magic of opening a
door possible.
We’ll leave you with a comprehensive understanding of how access control systems
work and the language needed to communicate about it with vendors.
What is physical
access control?
An access control system allows you to
manage, monitor and maintain who has Access
Think about a small business located in a larger building: The company will use the access
card provided by the landlord to get in the front door. However, it’s often the case that the
landlord is not responsible for the specific office security. Thus, the small business might
wish to install their own access control on their doors, and a seperate intrusion detection
alarm in the office, along with one or more video cameras.
****
****
****
Credentials
This is your electronic “key” and it grants you access. It could be an
access card, ID badge, ID card or smartphone-based mobile app that
acts as an electronic key. People use one, or a combination of all
three, to gain access through the doors that are secured by an access
control system. The form of access cards is the same as credit cards,
so it fits in your wallet or purse; however, demagnetization is very
common with basic access control cards. The benefit of using mobile
credentials is that they are personalized, so any unlock event can be
tracked back to the person associated with the credential.
Card Reader
The card reader, mounted on the wall, electronically reads your creden-
tials and sends a request to unlock the door (using your user credentials)
to a server. Typically, the type of cards used are proximity cards, which
require the card to be held in a 2” to 6” proximity to the reader—as
opposed to being inserted. Card readers are mounted outside of the
perimeter (exterior non-secured wall) and next to the door they should be
unlocking. In addition to card readers, some access control systems
provide the option of using keypads (PINS) or biometrics, instead of cards
or smartphones, as credentials. This is rather uncommon, since PINs can
easily be passed on and biometrics are difficult to manage—especially if
employees or visitors don’t want to share their fingerprint with your
company.
Admin Facing Side
of Access Control
The admin-facing side is where your office In more advanced systems, the manual operations can be
administrator, head of security or IT manager automated. For example, the provisioning and de-provisioning
sets the parameters on who can gain access (creating and deleting access) can be done automatically by
and under which circumstances. This involves connecting the access dashboard to your company directory of
a management dashboard (often cloud based) employees. When a new employee shows up in the system, a new
and a way to provision access, i.e. a card access right is automatically provisioned via a directory like Google
programming device. Apps, Microsoft Azure, SAML or Okta, among others.
Management dashboards are portals where API and integrations can be used to automate manual
administrators can manage, maintain and workflows and to make operations less prone to errors.
control access for employees, visitors and
staff.
****
API Integrations
The ability to automatically provision employee access is
thanks to the power of API integrations. Rather than
reinventing the wheel, many access control systems
choose to integrate with other apps that provide added
functionality, like single sign-on and active directories, or
more niche SaaS tools, like visitor management or member
management softwares.
Power to lock
Pro Controller
Lock
CAT6 cable
Pro Reader
switch supply
CAT6 cable
Some locks open when power is supplied (fail secure locks) and
some locks lock when power is supplied (fail safe locks). The reason
for these two different types of locks: In the event of a fire some
doors, like your front door, should remain open to comply with
building and fire codes—they must allow people to exit the building
at any time. Other doors, like an IT room door, are wired fail secure
and should remain locked even during an emergency.
In terms of locks, we see everything from electronic strikes, electromagnetic locks (mag locks), electric exit devices,
electrified mortise door lock sets, and many more. Based on your door type and construction, the integrator will
specify the best lock to install.
Regardless of the lock that’s installed, most are wired back to the access control system panel.
It’s important, while building out the space, that all the
necessary cables are specified, so that the general contrac-
tor knows what to do. If the cables are not planned in at this
point, they need to be added later and someone will have to
drill into your newly painted walls.
Typically installers take a few days, from confirmation of the order until the actual installation, because they need to order
the parts required for the installation. Once you have an actual installation date, you’ll find that the installer will do the
following:
building’s specifications.
****
****
****
When should certain doors unlock? Which types of access groups or individuals should be able to gain access? The
door access schedule can become political: Are IT managers allowed to access all doors? What about executives?
Are they allowed in the office 24/7? It’s a good exercise to discuss this with your security, facility and management
teams, since these are the rules that your strategy will be based on and it will determine what you actually want to
control.
Now, under certain conditions, you want the user not to be able
to unlock the door. Run through all possible scenarios. Many
offices get broken into during vacation days. Some offices
automatically unlock their doors during work days. If the work day
is a public holiday, burglars know they might just be able to walk
in.
****
Alarms
An alarm is a device that emits some sort of attention-grabbing audio-visual signal when its
alarm conditions are met. These conditions generally relate to some sort of issue or anomaly
in the environment of the alarm. Alarms come in many forms—loud siren, silent, fire, burglar,
smoke, etc. All alarms mentioned here track some parameter of their environment, and when
a change occurs, they notify the administrator of said change.
****
Fire Alarms
Fire alarms are arguably the most important type of
alarm you can have in any space. Forget about loss of
equipment or information, what is at stake are the lives
of your employees. Having a functioning and competent
fire alarm is not only paramount, but also required by law
in every state.
Smoke Alarms
Automatic smoke alarms usually come in two varieties:
Smoke and heat sensors, while some systems offer
both. Alarms can only detect the by-products of
fire—smoke and heat; AI image recognition technology
is not quite commercially available at the level where a
camera could reliably detect flames, yet.
Often, an office fire will not be a blaze, but instead a slow burn of some plastic or other synthetic materi-
al. These will not give off enough heat for any detector or human to notice, and sometimes may not even
emit visible smoke, but they will emit noxious gases like carbon monoxide (deadly and odorless) that are
far more dangerous. Most fire-related deaths in the U.S. are caused by inhalation of toxic fumes, rather
than all out fires. Heat sensors cannot detect these, but all modern smoke detectors can, so you’ll
probably want to opt for one (per room!) of those in your office or residence.
*****
Motion Sensors
Unlike door and window sensors, motion sensors can be set
up anywhere in your office or home, and as the name sug-
gests, they are triggered by motion in their line of sight. You
might set these up in discreet places, like at the foot of a
door, where someone entering would necessarily trigger it, or
if it has a wide view, simply in a top corner of the room where
it can get a bird’s-eye view.
The crux here is that infrared light is emitted by any body that emits
heat, so if any warm body (read: any person) enters the room, the
heat signature of the room will change, and the sensor will detect
this and trigger the alarm panel. These sorts of sensors can be used
in conjunction with the tripwires, and add a layer of security to a
room when an administrator wants to monitor its usage. Unfortu-
nately, the nature of these signals is that they are rather murky,
especially with most commercially available systems, so while you
will be able to tell if there is a person in the room, you generally
won’t be able to tell how many people are in the room, or any sort of
granular data on size/shape of the intruder.
Cabling
For fire alarms, in the case of a roof smoke detector, even though aesthetics are important it is usually
advisable to have it be evident which is the fire alarm, to prevent employees from accidentally covering
it up (in which case it would no longer serve its purpose). Burglar alarms, on the other hand, will often
warrant a certain measure of discretion and hiding, especially in the case of those trip wires that are
specifically meant to not be seen.
In any event, we recommend going over your floor plan thoroughly with the installer before making any
sort of decisions as to the placement and installation of the alarms.
Alarm Panel
Provides smart alarm systems for business- -Incompatible with other access control
Getsafe es looking for simple, easy-to-install alarm alarm systems
kits, and for homes in need of do-it-your- -32 user maximum
self modern security and automation -Not ideal for large alarm systems for
solutions. The commercial door alarm businesses
system is ideal for small and family-run
companies since it’s based on a starter kit
connected to a mobile app.
-Pricey
Offers intelligent security alarm systems for
-Charges additional fees for instal-
Vivint business and homes. Its real-time access
lation
control alarm system is powered by 24/7
-No 24/7 support
remote alarm monitoring. The home securi-
-Long and complex contracts
ty solution of this company consists of
-Buggy mobile application
access control alarms, CCTV camera, home
automation, energy management and
commercial door alarm systems.
Concretely, this means that for most small offices, the systems you install
will largely resemble a home security system, with perhaps the added
occasional security camera, or reinforced door lock for a server room.
The intrusion sensors, fire alarms, door locks, etc. will by and large be the
same ones across most similarly-sized spaces.
We would highly recommend assigning a fire alarm to exterior monitoring. This should seem
obvious: If there’s an actual fire in the building, the administrator won’t have the time to go in
search of the IT cabinet/alarm panel and run the alarm protocols. Therefore, you’ll want an
automatic monitoring service to receive the signals from the fire alarm, do some basic (and
quick!) false alarm control, then trigger the systems and get the building to evacuate.
Now we can move on to burglar and intrusion alarms, where the choice actually exists. In
general, monitored services tend to be more reliable, with false alarm detection, quality
controls, failsafes, and backups, but they are usually costlier (with licensing fees), and less
flexible/configurable, coming in pre-established pack sizes. As a general rule, a larger building
with more doors, and more to lose, will want to go for a monitored system with a trusted,
established company, whereas a smaller or more niche business might want a more versatile
and self-monitored option.
Some of these systems might lend themselves to self-monitoring, but most of them all but
require automatic monitoring. For standard door and window sensors, in any office with more
than a couple of employees and one door, if the sensors are constantly on then some sort of
automatic tracking system should be employed. Otherwise, an IT admin could see herself
sifting through hundreds of opening events a day, which is simply intractable. Some sort of
automatic pattern analysis, certainly available commercially, would be advisable here. Even for
door and window sensors that are only active on the “off hours,” so to speak, some sort of
external monitoring might be the right call. Indeed, if an unauthorized and irregular access
happens at night, and the IT admins are asleep, they’d still want the break-in to be recognized
as such, and for the alarm to be triggered. The same sort of logic applies to motion sensors,
and to door forced open sensors.
In general, despite the sometimes elevated recurring costs of a monitored system, our recom-
mendation would be to make the leap and spring for a professionally monitored system if you
want your office truly secure with 24/7 response times.
The Future: Sophisticated
Security Systems and Predictive
Data Analysis
Access
Connectivity
Connectivity is the hot topic in home and office security; the most modern offerings are inte-
grated systems, where each component of your security suite communicates with the others.
This way, they are better able to track activity and use of the office/home, and provide you with
more comprehensive and fool-proof security. To give a straightforward example, if your fire
alarm is connected to your access control system, then in the event of a fire, the alarm can tell
the door controllers to unlock all the doors, allowing employees to exit the office more quickly.
Similarly, if your motion sensors are connected to access control systems, and they detect an
unexpected movement in the office, they can tell the doors to lock themselves—either
preventing further burglary, or even locking in the burglars while the police arrive.
Data Analysis
Another rich path of innovation, on the back end of these systems, is the
increase in complexity of the data analysis algorithms that track your office
security data. As I discussed in the monitored vs self-monitored section,
the best security systems for larger offices will be monitored by third
parties (the security companies themselves) and innovations in data Here’s the second part of
our physical security
algorithms for monitoring will make these even more effective. A prime guide—the next topic is
the one missing element
example is the door and window sensors: As I’ve discussed, for an office of
of future security innova-
any size there will be dozens, if not hundreds, of opening events for any tion we haven’t discussed
yet.
door you’d want to have a sensor equipped on—so it would be useful to
have it monitored by an automated system. With the more sophisticated
modern algorithms, though, beyond just telling you if a door opened at an
unusual hour, they will be able to tell you, for example, if the door opened
an inordinately high amount of times in a day—possibly indicating that the
office is over-crowded, and prompting you to take action accordingly. Data
****
science is a very exciting field, and its applications to home and office
security present some very appealing paths to innovation.
Video Surveillance
In this section, we’ll cover a crucial aspect of physical security: Video surveillance. It’s
important to note that this does not just limit itself to the classic CCTV camera monitors
stacked on top of each other, with poor quality, and two confused guards trying to track
a burglar. This extends to everything from a private camera on the porch of your house
to modern, sophisticated IP cameras that perform data analysis and can track employ-
ees around the office with facial recognition to accomplish an audit. I’ll survey the most
popular types of cameras out there, and then give overviews of the modern features you
might expect to have in a good one.
In this first section, we’ll cover the main types of security cameras—fixed cameras, PTZ cameras, hemi-
spheric/fisheye cameras, multi-directional cameras, covert cameras, and dummy cameras. In the next
section we’ll move on to the different features to look for within these types of cameras.
Fixed Cameras
Connectivity is the hot topic in home and office security these days, with the most modern offerings
being integrated systems; this is where each component of your security suite communicates with the
others. This way, they are better able to track activity and use of the office/home, and provide you with
more comprehensive and fool-proof security. To give a straightforward example, if your fire alarm is
connected to your access control system, then in the event of a fire, the alarm can tell the door control-
lers to unlock all the doors, allowing employees to exit the office much more quickly. Similarly, if your
motion sensors are connected to access control systems, and they detect an unexpected movement in
the office, they can tell the doors to lock themselves, either preventing further burglary, or even locking
Dome Cameras
They offer much the same features as a box security camera, comprising camera, lens, and mount all
together, but offer the advantage of being sleeker and more aesthetically pleasing. In addition, given the
dome over the camera, they offer protection from the lens both from environmental factors and from
vandalism.
Bullet Cameras
Bullet cameras are essentially more modern and sleeker versions of the box cameras. They also combine
camera, lens, and housing in one package, but generally also include IR illuminators for low lights, and
offer a much smaller footprint than the box cameras. Generally used for low light environments.
PTZ Cameras
These cameras, unlike fixed cameras, offer pan, tilt, and zoom features, enabling you to survey a much
wider swath of the room, and zoom in on areas of interest. Depending on the particular model, you’ll
almost always be able to control its movement via joystick, and some even offer an auto track feature.
These will be equipped with rudimentary motion tracking systems, as described in the previous section,
and upon detection of motion, track it and continuously record. This feature becomes incredibly useful in
the case of any sort of break in where the criminals are familiar with the space and might seek to avoid
PTZ cameras might come in an open format, similar to an articulated bullet camera, or they might also
come in a dome, akin to the fixed dome cameras, making them environment and vandalism proof.
fixed ones, it does share the same limitation as them, being a limited specific field of view. Of course, you
can follow an individual from one side of the room to the other, but if there are two people on opposite
sides of the room, you will only be able to see one at a time. That is, unless you have a hemispher-
ic/360/fisheye camera. Known by any one of these names, this camera is similar to a fixed camera in
everything but the lens, which is where its main innovation is: the curvature of the lens grants it a wide
The utility of this cannot be overstated. You can, for instance, install one of these at a corner in a hallway,
and in one continuous image monitor the entire hallway. Or you could install two at opposite corners of a
room, and have a failsafe: in case one of the two malfunctions, or is tampered with/covered, you’ll still be
monitoring the whole room. While they are generally pricier than fixed cameras, given the particular
design of their lens, they could certainly be worth it for your space.
Multi-Directional Cameras
Multi-directional cameras allow you to view a wider area, much like
lenses into the same enclosure, rather than having one wide-angle
lens. They provide much the same benefits as a wide angle lens,
but the main advantage to this method over the former ones is that
Dummy Cameras
Finally, the last type of camera here is not even a camera, but a dummy; made to look like a real
security camera, with some blinking lights or a company sticker, it’s nothing more than a plastic or
polycarbonate shell. It might seem that installing these is a foolproof way to increase security:
They’re cheap, easy to install (no wiring), and would deter most petty thieves. However, don’t be
fooled: To the trained eye, they are easy to distinguish from the genuine article. They might even
give those criminals confidence: If they see and recognize that you have a fake security camera,
they will likely know that you have no real security cameras in place, and might be more likely to
attempt a burglary. In most cases, they are more help than hindrance, but we would recommend
not putting too much trust in them.
In this subsection, we’ll switch from discussing different types of security cameras and focus,
instead, on features that each of these types could have that you might want equipped when
installing a camera in your space. The first few will deal with software components, centered
around IP connectivity, and the last few will be more about the hardware of the camera.
Wireless IP Connectivity
The vast majority of modern security cameras use IP (internet protocol) connectivity technology,
and many later features hinder on this element. This means that the information is transmitted as if
the camera were a computer, and will be measured in megapixels and transmitted over the
network, rather than through traditional cabled solutions. There are many advantages to this: They
are more secure, the same amount of security as your network, rather than relying on antiquated
cables. Furthermore, the quality can be drastically better, as IP solutions can transmit data at much
higher rates.
Also, they are easier to install, as the only cable that needs to be installed is the power, and even
then if you opt for a wire-free one and use batteries, you can eliminate wires altogether. Finally,
and perhaps the best part, they offer so many more options for data analysis. Given that the video
data is being transmitted to a computer, rather than a simple DVR, the computer can then analyze
that footage, and glean all sorts of insights from it.
Compression
A notable benefit that IP cameras offer, which aids in the quality of video mentioned previously, is
data compressibility. Analog security cameras communicate their feeds directly to monitors via
wiring, but modern IP cameras, given that they’re run over the network, can compress their feed
and thus send much larger packets (read: more pixels, higher quality video) to the computer. The
obvious benefit here is that you will have a much easier time distinguishing features in the video,
and you’ll have none of that antiquated pixelated feed that you see in older TV shows or movies.
Alarm I/O
Another feature available with IP cameras is Alarm I/O. This means that you can either physically
plug in, or virtually connect via the network, alarm systems to your security camera. This integra-
tion is extremely useful. For starters, many security cameras take a lot of energy, or a lot of data to
record, despite the compressibility. Therefore, to be able to hook them up to a motion sensor, such
that they only start recording when the motion sensor is triggered, and record any potential theft,
would be very helpful. They would be connected to the sensor, which would relay information to
them, and then they would be relayed into the alarm panel, where they send their data.
The uses aren’t limited to that, though. With modern video analysis techniques, the cameras
themselves can be the source of the alarm, and communicate to the panel that an individual is in
the space at an unusual hour; or, with facial recognition, that an unknown intruder has entered the
field of view. The ability to integrate your security camera with your alarm systems is key, and
definitely a feature to be on the lookout for.
Night Vision
No, not magical night vision like Superman and Kryptonians. We’re talking about a relatively mun-
dane technology these days that I’ve already discussed in the alarms section: infrared light sen-
sors. As mentioned, all warm bodies emit heat, and IR light is just that: Heat, or lower frequency
photons. Physics notwithstanding, the upshot is that if a camera is equipped with an IR light
sensor, it will be able to detect warmer bodies even when there is not visible light, which happens
often—be it at night or in unlit rooms. This can be communicated to a monitor, where a human can
observe it, or with modern cameras it can even be automatically processed, much like the motion
sensors described above; if programmed to do so, it can send a signal to the alarm panel that there
is an unexpected individual passing by the camera. This feature is particularly pertinent at night,
when operators would be asleep, or in rooms where nobody is supposed to be, like a locked vault,
or a server room.
Durability
Switching gears a bit from IP compatibility, durability is an important factor to consider for many
cameras you might wish to install. Many cameras sacrifice durability or sturdiness in favor of sleek-
ness or aesthetic value, so if you’re wishing to, for instance, install a camera outdoors, or in a place
where it’s susceptible to be vandalized, you will have to keep that in mind. A good choice for a
more durable camera is a dome camera, simply because the fragile lens is protected by a generally
polycarbonate covering, and you can even find PTZ or fisheye or multi-directional dome cameras;
hey don’t have to be fixed.
Focal Type
Another important physical factor in a camera that you’ll want to consider is the focal type. For
those unfamiliar with photography, this is the term applied to the different types of lenses you can
have on a camera, as your choice of focal type will directly affect the field of view of your camera.
For instance, you can have a wide-angle lens, like a fisheye camera, or a prime lens, which has a
fixed focal length (can’t zoom or unzoom, always focuses at the same distance from the camera,
useful for smaller rooms), or a zoom lens, which should be relatively self-explanatory. This is
certainly an important feature to consider based on the particular topography of the area the
camera will be in.
Form Factor
Finally, you’ll likely want to consider the form factor of a camera when choosing one. The form
factor here refers to the basic aesthetics of the camera: How sleek it looks, how well it blendsor
fits in with the décor, etc. If the camera is merely in a warehouse, then this won’t matter as much,
but if it is in a very publicly visible area, then it’s certainly an important factor to consider when
making the decision. Do you want to make the camera inconspicuous? Or very conspicuous, but
tastefully so? Should it be garish in color to attract attention, or subdued to blend in? Questions
like this are essential in the decision making process when purchasing and installing security
cameras.
New Technology and the Future:
Data Analysis and
AI Facial Recongnition
Moving away from commonly
available features, now we’ll
discuss those new, cutting-edge,
exciting features that will define the
future of video cameras.
AI facial recognition might be one of the hottest topics in tech today. From controversy over Apple’s new
face ID method, to using Deepfakes to create hyper-realistic videos of celebrities, AI and facial rec. are at
the forefront of the industry, and for better or worse, video cameras are starting to adopt it into their
platform.
Now what does this represent? Well, as with the general applications of facial recognition, its uses here
are varied. The most straightforward use is recognition of known/allowed persons to a space, and con-
versely recognition of unwanted persons. For instance, if there was a facial recognition-equipped camera
at the entrance to an office, employees and authorized personnel could register their facial features so
that it remembered and recognized them, and it would thus be able to detect an intruder and warn the
administrator of such. In addition, if the video camera were integrated with an access control system, like
Kisi, much like we discussed for alarm systems, then it could toggle the access control and unlock the
relevant door when an authorized person presented their face to the camera. Similarly, when it detected
an intruder or unrecognized face, it could lock the doors until actions were taken accordingly. Finally, it
First off, as mentioned with the facial recognition technology, you can use video cameras to automatically
track specific employees’ movements and uses of time throughout and across days. Of course, with any
sort of tech like this, there are issues of privacy that will naturally come up and, while I’m not a legal
expert or purporting to give legal advice, that will definitely be something to consider before putting these
protocols into effect. However, that issue notwithstanding, being able to automate person tracking and
systematize it has enormous potential, and there’s no reason to think that it won’t become an industry
standard in the near future, with the massive push toward efficiency and optimization for productive time
occurring today.
Similar to employee tracking, video data analysis can be used to track the use of space, and to help you
optimize your allocation. For instance, if a tracking algorithm finds that too many people are using a given
room too often, and it’s bordering on either the unsafe or the unproductive, you can impose limitations,
and reorganize desk locations, to ensure a safer and more productive environment. Following on that
same safety tack, if a video system notices that at a given time the occupancy of a room poses a hazard in
the case of an emergency, it can notify the administrator, who will then take steps to diffuse the situation.
Combining these points, we arrive at a natural conclusion—many offices are taking steps to run audits of
their stores with video cameras. This makes sense because if you’re able to gain a full understanding of all
the comings and goings of people and merchandise in your store, with simple data analysis, why waste
time and money on more expensive traditional methods? With these applications, video surveillance
becomes one of latest industries to be revolutionized by modern data analysis tools.
Closing Thoughts
Hopefully, after reading this guide, you’ll have a more clear idea of what phys-
ical security is, and what different components you might need. An overarch-
ing point throughout has been connectivity, and if we haven’t stressed it
enough yet, here it is again—if this guide can impart just one nugget of
wisdom, it should be to integrate all your systems together. With integrated
alarms, video cameras, and access control systems, you will dramatically
increase the safety of your space, and ensure that you’re as protected as
possible.
All of us at Kisi wish you the best in securing your space! Let us know how we
Contact Us
See Kisi in action
We provide an easy-to-manage system to regulate security
at home or at work, and that’s what you’re here to discover.
The best access control systems combine top-notch
software (including software infrastructure, like the Cloud
and IoT) with the right hardware.
How it Works
https://www.getkisi.com/how-it-works
https://www.getkisi.com/pricing
Contact Us
https://www.getkisi.com/contact-us
CAL L US EMAIL
+1-646-663-4880 [email protected]