Question A.01 : Is ordering from SSP's online website secure?
Yes. We take the utmost care with the information that you provide us when placing an order on our website.
In addition, we do not store any of your critical credit card information, as we use trusted payment companies PayPal and Authorize.net to handle all of our credit card transactions.
If you have further questions about the security of ordering online from SSP, please feel free to e-mail us at email@example.com.
Question A.02 : How do I create a 'New Account' on the SSP Website?
To help deter against fake/fraudulent accounts, we’ve implemented two ways of creating a new account.
Method #1: Submit an Authorized Reseller Application. You’ll be vetted and will have an opportunity to choose your Login Info.
Method #2: Make an actual purchase.
-Add product contents into your Cart.
-Proceed to Checkout.
-Under Billing Details, check the box next to Create an Account.
-Continue on with the purchase.
-Input your Username and Password when prompted.
-This login should allow you access to My Account upon your return visit to our website.
Question A.03 : How will I know that you have received my order?
After placing your order, you will receive an email confirmation within minutes of order placement.
Once your items have shipped, we will send you another email containing shipping information.
Question A.04 : Which countries do you ship to?
We ship to anywhere in the world.
For the Lower 48 US States: You can purchase directly on this website, or we can take your order directly @ firstname.lastname@example.org.
For Hawaii, Alaska, and for other countries please contact us @ email@example.com, for a custom quote that will include appropriate international freight/shipping fees.
Question A.05 : What are your shipping and handling fees/rates?
For orders in the Lower 48 US States: We offer FREE Shipping/Handling on product orders of over $50.00 USD. (For under $50.00, a flat charge of $9.99 will apply).
For orders outside of the lower 48 US States, or if you have expedited shipping needs: Please contact us for a custom quotation.
Question A.06 : Which shipping couriers do you use?
For smaller orders we may use USPS First Class / Media Mail.
For medium to larger orders, we either use USPS Priority shipping or FedEx/UPS Ground.
If you have expedited shipping needs, we can accommodate if you send us your UPS Account Information..
For Hawaii, Alaska, or International customers: We use DHL or UPS.
Question A.07 : Can you use our shipping account to send our orders?
Yes we can. Just send us all pertinent courier info, including a written authorization to use your account for sending your orders.
Question A.08 : How long after placing my order should I expect to receive my shipment?
Depending on your destination: All orders shipped to the Lower 48 U.S. States shall typically arrive in between 3 to 6 business days.
Please note that we are shipping from Hayward, CA, USA (Zip Code 94545).
Question A.09 : What if I need to return my product?
For any issues, please contact us at firstname.lastname@example.org. Type your SSP Order # in the Subject Field, along with a detailed description of your troubles in the email body.
Do not return any product without receiving a proper Returns Merchandise Authorization (RMA) # from us beforehand. It will be sent back to you, as-is. Buyer is responsible for all return shipping costs.
Question A.10 : What are your payment options?
We accept credit card payments directly on our website via PayPal and Authorize.net, leading online payment providers offering the most secure forms of payment encryptions.
For Authorized Resellers, we can accept direct Purchase Orders. Our payment terms are NET 15 (non-negotiable).
Question A.11 : Is there a purchasing limit to credit card purchases?
Yes. For security reasons, direct Credit Card transactions submitted using Authorize.net are limited to $4,999.99 USD.
For online purchases $5,000.00 or higher, feel free to use Authorize.net’s ACH/Debit option.
Question A.12 : Who can become an Authorized Reseller, and how can we apply?
Our Authorized Resellers are composed of Security Integrators/Installers, Consultants, Red Teams, and Distributors.
Download the Reseller Application here.
All applicants must clear credit & background checks, and are subject to full review.
If your entity holds a valid Sales Tax Exemption Certificate: Provide us a copy of the certificate and your account will be configured as Tax Exempt.
We reserve the right to reject/deny any application for any reason.
Question A.13 : For Authorized Resellers, what are the payment terms?
The Payment Terms are NET 15 (non-negotiable).
This means that 100% payment is due within 15 calendar days of each SSP invoice submission.
Question A.14 : What is the buying discount for Authorized Resellers?
Authorized Resellers are able to buy our products at 25% off of MSRP.
Question A.15 : Is there a purchasing quota for Authorized Resellers?
Yes. Authorized Resellers must procure a stated value of our products annually. Whether directly from SSP, or through our authorize distributors.
Please reach out to us for more details.
Question A.16 : How and why should we become a Certified Reseller?
Authorized Resellers (that currently employ at least 1 Full-Time security systems designer/engineer), whom has successfully passed from a list of pre-qualified training programs, are automatically eligible to become Certified Resellers. (This designer shall be termed as the “QI”, or “Qualifying Individual).
An example of an approved program is offered by Dynamic Certified [Course 4.01] Access Control Training Class : Penetration Attack Tools & Advanced Countermeasures.
The significance of these programs, are that they establish & elevate the Reseller’s overall aptitude & proficiency, in that:
A) They have gained proven knowledge into identifying, understanding, and in mitigating modern security risks & threats.
B) They will bear the know-how to properly apply advanced, counter-measuring security products.
*The duration of the Certified Resellership status may depend on the length of validity of the training program’s certificate. Should said training program issue certificates bearing date-based durations and/or expiration dates, it will be expected that the QI renews/re-trains to keep their represented company’s Certified Resellership status in good standing.
Question A.17 : What are the advantages to becoming a Certified Reseller?
-Certified Resellers are ‘up to speed’ in the newest threats & vulnerabilities pertaining to Physical Security Systems. This positions them to be much more valuable to their customers, as compared to their competition who are likely to be ‘in the dark’ about such threats & vulnerabilities.
-Certified Resellers are privy to an added buying discount percentage, in addition to the standard Authorized Reseller discount.
-Certified Resellers receive priority technical support from SSP.
-Certified Resellers receive the latest information and critical updates first.
-Certified Resellers are added to a client-accessible list, containing SSP’s Authorized & Certified providers. It is more desirable for potential clients to select Certified Resellers as their service providers, for their added expertise.
Question A.18 : What's the significance in obtaining additional security training?
It assures that your firm:
A) Has been apprised of the most current hacking threats & vulnerabilities impacting Physical Access Control Systems.
B) Has the proficiency to apply the best practices and advanced countermeasure tactics as necessary into your designs, to offset the latest threats. (This includes proper implementation of SSP’s solutions, amongst other advanced security brands in addition.)
Question A.19 : Is there a higher level of buying quota for Certified Resellers?
No. The quota for our Certified Resellers is the same quota as Authorized Resellers.
Question A.20 : What is the difference between becoming an Authorized Reseller and a Certified Reseller?
–An Authorized Reseller is a security provider that is able to buy our products from our website, discounted, free of sales tax, and for the purposes of resale. An End User cannot qualify to become an Authorized Reseller.
–A Certified Reseller is an Authorized Reseller, that in addition employs at least one Engineering, Operations, or Installation representative that has successfully completed from a list of pre-qualified 3rd party security training programs.
Question A.21 : Do sale prices on Spider's Website apply towards Authorized & Certified Resellers?
Yes. Authorized and Certified Resellers are still privy to sale-priced/discounted items.
However, items that are on sale on our website are only applicable to purchases that are made directly from our website. To do this just enter your assigned Reseller Coupon Code at Checkout, and you can take advantage of the added cost savings.
Please do not send us Company Purchase Orders with prices that you may see on our website.
Coupons may not be apply towards sale-priced items.
Question A.22 : What happens if we lose our Qualifying Individual?
If you have attained Certified Reseller status, but no longer have a Qualifying Individual ‘in-house’, you will have up to 12 months to replace them with another QI.
*SSP reserves the right to check upon current QI status, at any time, and reserves the right to negate Certified Reseller status accordingly, and with or without cause or warning.
Question A.23 : I'm an End User. Is there a difference between hiring a Certified Reseller, as opposed to 'non' certified?
Yes. Certified Resellers bear advanced knowledge of current vulnerabilities impacting Physical Access Control Systems. They are aware of very specific threats, and hence are better positioned to design and install more effective security plans. We highly recommend hiring them.
Non-certified service providers are still able to furnish and install our products. However, they are likely to be without the vital knowledge and unaware to modern threats. If such was the case – A customer may not receive full protection value for their investment.
Question A.24 : I'm a customer. Can you provide me with a list of Authorized & Certified Resellers?
Question A.25 : What if I have received a defective product?
Should you have any issues with any of our products, please ensure that you have followed all recommended procedures, have visited our FAQ Section, and have communicated with our Support Team.
Contact us at email@example.com. Don’t forget to add your Order # in the Subject Field along with a detailed description of your troubles. Do not return the product without a proper RMA #. It will be returned to you, as-is.
Question A.26 : Who can I contact in case I need Technical Support for an SSP product?
The best method is to contact us via email @ firstname.lastname@example.org. Don’t forget to add your Order # in the Subject Field along with a brief description of your troubles.
You can also leave us a voicemail message at (800) 501-2133. We’ll try and call you back as soon as possible. Please ensure you state:
-Your Full Name & Callback #
-Your Company represented
-If your company is a Certified Reseller
-Your SSP Order #
-A brief explanation of your issue(s)
We’ll do our best to respond back to you as quickly as possible.
Question A.27 : There seem to be a lot of products labeled "Coming Soon". Why is this?
Please bear with us, as Spider Security Products is a is privately owned corporation & self-funded startup business.
We have TONS of fresh ideas and innovations in the works, and we highly appreciate your patience & support!
Question A.28 : Where are your products manufactured?
SSP has built (and continues to build) an extensive network of top-quality Domestic (USA) & International manufacturing vendors. Each partner must consistently meet our stringent product specifications, and with each and every single order.
We have established relationships with a diverse group of agents and factories throughout the world including the United States, Mexico, Canada, Europe, UK, India, China, Taiwan, and Japan. As a result of our combined purchasing from proven vendors and freight consolidations, we are able to provide top value for our clients.
Here are a few of sourcing examples:
-Spider Step Bits: Made in the USA
-Spider Blockers: Made in the USA
-Spider Tamper Switches: Made in China
Question A.29 : What is your fulfillment policy for back-ordered (pre-order) products?
Should Spider Security Products offer back-ordered (or pre-ordered) purchases to be made on our retail website, and for any item(s): We reserve the right to fulfill & send the order within 90 days from initial deposit/full purchase payment.
Should we fail to fulfill & ship your order within this time-frame, we can provide a refund (upon request).
Question A.30 : I am unable to add a product into my cart. Why is this?
If you are unable to add an item into your online shopping cart, it is likely because it is out of stock.
Our apologies (in advance) for any potential stock shortages, please do check with us again soon.
If you would like to be notified of product restocking or availability, please feel free to join our newsletter or send us an email.
Question A.31 : Why am I only able to buy 1 of a certain product?
When stock is limited, we may opt to limit purchases to 1 unit per customer, – to ensure that our products are made available to additional clients.
Question A.32 : Our company has multiple branches, will applying for one overall Authorized Resellerhip apply to all of our branches?
For security companies with multiple branch locations; and if each branch operates under their own tax resale exemption certificate; and if each branch has their own dedicated purchasing agent that will buy from SSP: Each branch shall be required to apply for Authorized Resellership, applicable to that branch only.
Question A.33 : Our company has multiple branches, will achieving Certified Resellerhip apply to all of our branches?
For security companies with multiple branch locations; and if each branch employs their own engineers/designers for the security systems that that branch installs : Each branch shall be required to employ one Qualifying Individual (QI) that has successfully passed a pre-qualified training program.
Question B.01 : Why was the Spider Blocker created?
Hacking & reverse-engineering is affecting copious amounts of hardware & software products. Electronic Access Control Systems are not exempt from this, and have even become a focal point.
Consumers pay an average cost of $4,000+ per each electronically-unlocked door, up to 2,000% more than traditional locks.
(“Hard-keyed” locks cost around $200).
Recently, major vulnerabilities in these systems have been exposed. When these risks are not proactively and retroactively addressed, the actual protection value of the systems will be exaggerated.
-What if each $4,000 premium security investment, was no better than a standard $200 lock?
-What if the premium security system actually weakened the buyer’s security posture?
From a criminal vantage-point, (and armed with select hacking tools in hand), your card reader itself, can be used as their key to gain access into your facility. We created the Spider Blocker to prevent this.
Question B.02 : Is the Wiegand signal one of these vulnerabilities?
Yes, it is.
The vast majority of manufacturers utilize Wiegand signals, for the transmission of sensitive credential data from readers to controllers.
However, Wiegand signals are not safeguarded by any type of software encryption or hardware protection. Data signals from the reader to the controller are transmitted in simple binary form.
A perpetrator is able to gain access to this signal, without impedance, in almost all cases.
Question B.03 : Can you provide more specific information on the hacking technologies that exploit Wiegand?
Many hacking devices are being developed to exploit the Wiegand signal. We have created a PDF report you can view here.
Question B.04 : How prevalent is the problem of building access control systems being hacked?
It’s of utmost importance to note, that during the entire MitM insertion process (before, during, and after), that there are no aesthetic, functional, operational, or performance traces of these hacking modules ever being deployed.
Everything will work as normal.
Security systems are not designed to sense, detect, or to account for MitM devices in any way.
-In virtually every case: No alarms will be triggered when an access device has been removed from its normal, mounted position.
-Accessing and implanting a MitM device onto a live Wiegand signal, can occur while avoiding detection.
-After insertion, the MitM device will be hidden behind that access reader, and cannot be seen from outside of it.
-Once the MitM is installed and operational: No peculiar system performance anomalies would be sensed that would trigger any alarms, or warrant any suspicions.
A customer may be exploited for months or years before any MitM breaches are found, if the devices are even discovered at all.
Because of this, coupled with a likely reluctance by any entity to disclose responsibly, and topped by the fact that there are very few countermeasure options to preventing these attacks: Exact & precise data on documented occurrences are very difficult to gather.
Question B.05 : Can [2FA] Two-factor authentication (like Card+PIN) prevent MitM attacks?
No, 2FA does NOT prevent MitM attacks.
2FA only dissuades other types of attacks, such as card cloning or theft. 2FA can deter a perpetrator who might have physically stolen, or has copied the data from a working access card. But without knowledge of that card identity’s matching PIN Code, they would be prevented from entering the secured space.
Requiring [Card+PIN] will not neutralize MitM devices. The reason for this is that access card credential data and numerical PIN keystrokes are both transmitted via vulnerable Wiegand signals.
With MitM devices able to capture both factoring data pieces, 2FA requirements can be quickly circumvented.
Question B.06 : What alternatives are there to either protecting or replacing Wiegand signals?
These are the options available:
1- Upgrade to OSDP (Open Supervised Device Protocol). OSDP is growing momentum as the ideal alternative to Wiegand, and is able to utilize all existing cables. However, it requires replacing all current equipment with OSDP-enabled access readers and controllers.
2- Upgrade to other manufacturer-specific (proprietary) products that offer secured signal transmissions. You may need to replace cablings existing cables, but will undoubtedly need to replace all reader and controller hardware.
But a tale of caution when using a proprietary system:
A) Without (open-source) competition, prices can be expectedly much higher than industry standards.
B) A consumer may become “locked into one” service provider, without a network of competitive service providers. There are many cases of customer dissatisfaction in these circumstances.
3- Upgrade to a new IP-based access system. This will require all new (ethernet) home-run cables (with much shorter maximum cable lengths), and new IP-based access readers and controllers. This option is likely to be the most expensive method.
4- Enhance your existing system with the addition of Spider Blockers. System replacement is optional, and not mandatory!
With this simple hardware enhancement, you system would be protected against all of the very same threats as the other methods listed above, but with a huge difference: Your system will also be protected from MitM devices that will be released in the future.
Spider Blockers are the #1 solution against MitM hacking, and also the only one that is signal-agnostic (future-proofed).
Question B.07 : How secure is OSDP? And how do I use it?
OSDP utilizes bi-directional communications between the reader and controller, offering a more secure alternative to Wiegand (which uses 1-way communications).
Deploying OSDP is typically composed of installing an OSDP-compliant access device (e.g. Card Reader), communicating to an OSDP-compliant controller or OSDP-to-Wiegand signal converter.
A system upgrade would typically require replacing every single card reader and access controller, to OSDP-compliant hardware. New premise cabling are sometimes required, and access cards may also need to be re-furnished.
It is of high importance to note. that OSDP makes no guarantees that it cannot ever be hacked or reverse-engineered, as the Wiegand signal has been.
Question B.08 : Do we have to choose between OSDP and in deploying Spider Blockers?
No, you don’t have to choose between one or the other.
In fact, we recommend that you use both. In doing so:
A) OSDP can establish 2-way communications between your access readers and controllers, and migrates away from the useage of unencrypted signals.
B) Spider Blockers will safeguard physical access to active data wires, and hence preventing malicious acts from occurring thereafter.
C) Spider Blockers will provide additional security layers to protect your system against other threats, such as preventing against Power Manipulation Tactics.
Question B.09 : What does the Spider Blocker do, and how does it work?
The Spider Blocker provides hardware-based protection for access control systems, and against against a multitude of threats.
As an anti-tampering module, the Spider Blocker is initiated by a tamper alarm signal that will trip when someone removes an access reader from its mounted position. When the alarm is sensed, key protection layers will be activated, as outlined here in this chart.
Adding even more value, the Spider Blocker can also serve as an ideal Door Lock-Down Module.
A hardware-driven component that can help mitigate threats in dangerous situations (i.e. Active Shooter scenarios); that is not prone to network latency, infrastructure downages, or server crashes.
Connected to a panic button, lobbies & public areas can be quickly locked down by the Spider Blocker, should a hostile situation arise.
Question B.10 : How can I know if we are an ideal candidate to use Spider Blockers?
The Spider Blocker is compatible with over 99% of all access control systems. Feel free to contact us if you have specific questions.
Question B.11 : Is there training offered on how to properly implement the Spider Blocker?
SSP does not currently offer formal training on Spider Blocker implementation. However, you can email us at email@example.com if you have any questions.
Question B.12 : How does the Spider Blocker get triggered into alarm?
There are 4 ways that the Spider Blocker may be activated:
1- The removal of an access reader from its mounted position should trigger the Spider Blocker via tamper alarm switch.
2- The Spider Blocker can be remotely activated with a computer controlled relay. (e.g. A CCTV operator sees a perpetrator tampering with a reader on camera – they can shut down the reader remotely using their access system software and activating a relay output.
3- When appropriate tamper switches are installed, cutting/tampering of the reader’s “home run” data cable may activate the Spider Blocker.
4- (When used as a Lock-Down Module): A panic alarm switch can be wired into the Spider Blocker to secure an area.
Question B.13 : Why didn't my previous security company connect Tamper Switches on our readers?
For several decades, Reader Tamper Switches were widely considered to be a non-critical, optional connection… as there were not yet any MitM technologies created that could hack Wiegand signals.
For a long period of time, security companies did not have have to be concerned about their readers getting hacked.
In 2007, a hacking presentation exemplifying vulnerabilities in Wiegand changed this notion. At that year’s DefCon hacker conference, Wiegand was hacked using the “Gecko”, as demonstrated by security researcher Zac Franken.
But given the available technology at that time (as available to the masses), the Gecko was relegated to an overly large form factor – meaning it was too bulky to deploy without being easily detected.
In more recent years, electronic components have shrunk greatly in size. The advent of technologies such as “Bluetooth Low Energy” or the ESP8266MOD miniature WiFi Module, have allowed more powerful versions of the Gecko to be developed.
Actual examples would be the BLE-KEY in 2015, the ESP-KEY in 2017, and the ESP-RFID in 2018.
Question B.14 : Can I just simply connect my readers' tamper switches directly to my control panels?
No, it is highly unlikely that an access reader can be immediately connected to a security panel. This is due to 2 main issues:
Problem #1- With reader hacking being a fairly new problem, most manufacturers have not actually built tamper switches into their access readers.
Problem #2- For those that do have them, their Tamper Switches usually output a 1-wire “open collector” signal. The problem with these outputs, are that they cannot be connected directly to security panels, which require 2-wire “dry contact” signal connections.
To be fair, by using 3rd party electronic components, you can bridge this (1 vs 2 wire) signal incompatibility. But simply monitoring this tamper alarm does not actually neutralize any of the harmful threats that MitM hacking modules can execute…which the Spider Blocker has been especially created to do.
Question B.15 : Can the Spider Blocker help resolve this 1-wire (reader) vs 2-wire (panel) disparity?
Yes. The Spider Blocker bridges the gap by converting the reader’s “1-wire signal” to a universally compliant “2-wire signal” that all control panels can monitor.
Question B.16 : Will I need to run new cables to my Access Readers, to monitor their tampering status?
If you currently have a 6 conductor “home run” cable running out to each Reader, you probably won’t need additional cables to account for the new tamper connection. Here’s why:
The typical wiring scheme of a 6 conductor cable connected to say, an HID Multiclass or iClass Reader, is as follows:
“HOME RUN” CABLE to HID (Reader Function)
RED to RED (+12VDC)
BLK to BLK (Ground)
WHT to WHT (D1)
GRN to GRN (D0)
BRN to BRN (Red LED)
BLU to ORG (Grn LED)
**** to VIO (Tamper) *this wire is typically left unused
As you can see above, the BRN wire of the “home run” is typically wired up to power on the Red LED.
However, since most access reader LED’s are already normally Red in color by default, this connection is unnecessary. As such, the BRN (Brown) Conductor can be freed up for other purposes, such as for connecting the access reader’s Tamper Switch to the control panel.
Our recommended rewiring work is as follows:
“HOME RUN” CABLE to HID (Reader Function)
RED to RED (+12VDC)
BLK to BLK (Ground)
WHT to WHT (D1)
GRN to GRN (D0)
**** to BRN (Red LED) *leave disconnected
BLU to ORG (Grn LED)
BRN to VIO (Tamper) *or connect to an external tamper switch
Note: This may not apply in every instance. If not, you may need to install a new conductor in between your reader and control panel to accommodate the tamper signal.
Question B.17 : What if my access reader device outputs a 2-wire 'dry contact' tamper switch?
In this case, connection to the Spider Blocker will be made easier.
2-wire ‘dry contact’ outputs come in two formats, “Form A” and “Form B”. Here are the configurations to accommodate both types:
*Reader Configuration for a 2-wire “Form A” (Common & Normally Open) Reader Tamper Switch:
-Place a small jumper wire in between Reader Ground and Tamper Common
-Connect the Tamper Switch’s Normally Open connection, towards the Spider Blocker’s Trigger Input
-Set the Spider Blocker’s S2 Switch to “Mode A”
**Reader Configuration for a 2-wire “Form B” (Common & Normally Closed) Reader Tamper Switch:
-Place a small jumper wire in between Reader Ground and Tamper Common
-Connect the Tamper Switch’s Normally Closed connection, towards the Spider Blocker’s Trigger Input
-Set the Spider Blocker’s S2 Switch to “Mode B”
Question B.18 : How do I configure the Spider Blocker to accept a N.C. or N.O. 1-Wire Open Collector Tamper Switch?
To accommodate for a N.C. 1-Wire Open Collector Tamper Switch (MODE A):
-Set Switch S2-1 to ON
-Set Switch S2-2 to OFF
-Set Switch S2-3 to ON
-Set Switch S2-4 to ON
To accommodate for a N.O. 1-Wire Open Collector Tamper Switch (MODE B):
-Set Switch S2-1 to OFF
-Set Switch S2-2 to ON
-Set Switch S2-3 to OFF
-Set Switch S2-4 to OFF
Question B.19 : What happens when the Spider Blocker is tripped into alarm?
The Spider Blocker itself offers Ten Layers of Protection. When triggered into alarm, the following countermeasure actions occur:
1- Power is disconnected to the Reader preventing “Card Skimming”. Most MitM hacking modules rely upon the 12VDC signal existing at the Reader. Disconnecting the power signal will disallow the MitM from utilizing this voltage and in becoming operational. Secondly, the removal of power also protects against Power Manipulation Techniques.
2- The Reader’s Data lines are severed preventing “Card Replaying”, which is the act of manually transmitting data upstream, with the intention of having the access control panel unlock a door, for the perpetrator (or an accomplice) to enter.
This is especially critical in neutralizing self-powered MitM hacking modules (i.e. as with the BLE-KEY), as severing the data lines will disallow its capability to attack.
3- The Spider Blocker will permanently latch, and the Red “Alarm” LED will be illuminated (Providing a physical, visual indicator of a breaching attempt.)
4- Alarm Output Relay #1 is activated. We recommend this output to be utilized for security status monitoring.
5- Alarm Output Relay #2 is activated. We recommend this output to be utilized for auxiliary purposes, such as in: A) Activating audible sounder alarms, B) Signaling a secondary monitoring system (such as a burglar alarm panel), C) Securing Door Locks (e.g. Door Lock-Down), or D) For many other practical uses.
Question B.20 : What should I do if my Spider Blocker becomes activated into alarm?
If your Spider Blocker is tripped into activation: Take caution in not acting too quickly into resetting it.
You should immediately contact your security vendor, to have them take a closer look at the reader. They are the best candidate to know what they did, and did not install.
During their physical inspection, ensure they seek out any potential MitM modules that may might been implanted.
If a module is indeed discovered: Take pictures of it and ensure then completely remove it from your system.
Reset the Spider Blocker only after any foreign modules are either: A) A MitM has been confirmed to not have been installed, or B) A MitM has been confirmed installed, but subsequently removed.
Our full instructions on “what to do” can be downloaded here.
Question B.21 : How do I reset the Spider Blocker?
First, the tamper alarm must be cleared (re-mount the reader into its normal, permanent position). Afterwards, there are 2 ways to reset the Spider Blocker:
1- There is an onboard pushbutton that can be pressed for local reset.
2- Send a 1/2-second pulse of a “short” into the Remote Reset input.
You’ll have visual confirmation of a successful reset, as the Red LED will turn off, and the Green LED will illuminate and stay lit.
Question B.22 : What are the ideal uses for the Spider Blocker's Remote Trigger input?
The Spider Blocker’s Trigger input has 2 main uses:
1- Wire it onto an output of your access control system. Once connected, it can be manually activated by an operator, or it can be grouped along with other Spider Blocker-equipped doors to allow for site lock-down purposes.
2- Wire it into a panic button. Once connected, it can be manually activated by an person (i.e. Receptionist), and can be set into alarm for door lock-down purposes, should a hostile event occur.
Question B.23 : Where is the best place to mount a Spider Blocker module?
The best place to mount Spider Blockers are in a locked security enclosure, inside a secure room within of your facility.
Never mount it outside, or in unsecured locations.
We include a pair of high-tack, double sided 3M Foam Mounting Pads with every module.
For higher density, more secured, or DIN-rail mounting, we offer the SSP-SBL-301-MNT Universal Mounting Kit.
Question B.24 : Why doesn't the Spider Blocker need to be programmed?
We created the Spider Blocker using electro-mechanical components: Intentionally voiding it of any type of programmable logic, firmware, or software.
In addition, security-related technologies, whenever possible, should be attempted to be secluded from networks, software-driven logic controllers, and the IoT.
As each of these examples run the possibility of being hacked, firmwares corrupted, and require additional levels of maintenance in some form to ascertain intended operations. An overwhelming majority of vulnerabilities, are software-based.
Hardware-based solutions in general, are typically more reliable & dependable.
Question B.25 : What is the difference in between the Spider Blocker Module, and the Spider BlockerBox?
The BlockerBox is simply a packaged solution that contains (Qty 8) Spider Blocker Modules, pre-fabricated inside of a wall-mountable & lockable wiring enclosure.
As space inside existing security panel enclosures can be very limited: The BlockerBox helps alleviates this issue promoting neater cable management and overall serviceability.
Question B.27 : Where is the ideal mounting location of the Spider BlockerBox?
We recommend that you mount the BlockerBox in a secured room, preferably nearby the access controller enclosure.
Keep in mind the following:
– The enclosure door’s hinges are removeable, so you can switch the pivoting side either left or right. However- If you move the hinge to the right side, you may need to relocate the enclosure’s tamper switch to the left side.
– If you are installing the BlockerBox onto an existing system: Consider the wiring length’s reach. You want to ensure a proper balance of cable slack on both the panel-side cabling, as well as on the door-side cabling.
Question B.28 : My Spider Blocker won't work! What am I doing wrong?
We’ve made a short-list below of the most common installation issues involved with Spider Blocker deployments.
(They are listed in no particular order):
1) Insufficient voltage in: Ensure no less than 12.00VDC Terminal Block P1.
2) Insufficient current capacity from power supply: Ensure bandwidth of at least 100mA per (1) Spider Blocker.
3) S2 DIP Switch Settings are incorrect. (Mode A or Mode B?)
4) Improper tamper wiring connection (Installer must test & verify Open Collector N.C. or N.O. tamper signals.
*It is highly recommended that installer tests each tamper signal prior to connecting into the Spider Blocker module, to ensure functionality.
If the issue is power related: We offer our very own Spider 12VDC 5A Power Supply. (Part #: SSP-PWR-1205)
For any further assistance, feel free to contact us!
Question B.29 : Is the Spider Blocker UL Listed?
The Spider Blocker PCB Board/Module is UL-94 Compliant. We will be obtaining additional UL Certifications in the near future.
Question B.30 : Should we only deploy Spider Blockers onto the most important doors of our buildings?
We recommend provisioning Spider Blocker for every access device on your system.
Your system is only as strong as its weakest link. Neglecting just one device, creates a a void in your overall security posture.
The primary objective is to eliminate the any & all possibility of card cloning or data replaying. Just one compromised credential, derived from a single unprotected reader, can create havoc in any organization.
Question B.31 : Can the Spider Blocker identify when a counterfeit/cloned access card has been used?
No, it cannot. Cloned access cards are often perfect identical copies of the originals.
With the Spider Blocker we focus on the root of the problem: By disallowing the theft of the data credentials (out of access readers) to begin with. Without this data, a perpetrator would need to find other means to steal credentials. And there are ways to prevent those other actions as well.
Question B.32 : Does the Spider Blocker store, analyze, process, save, or record data in any way?
No, it does not. All information from the reader is either passed through to the controller as-is, or expires instantly.
Not a single bit of data is stored in the Spider Blocker.
Question B.33 : Why is the Spider Blocker the ideal choice for initiating door lock-downs?
The Spider Blocker is the #1 ideal choice to serve as a Door Lock-Down Module.
A hardware-based component that can help mitigate threats (and losses) in dangerous situations, such as Active-Shooter scenarios.
Unlike software-based Lock-Down commands, it is not prone to network latency, infrastructure downages, or server crashes.
Connected to a panic button, lobbies & public areas can be quickly locked down with card readers disabled — should a hostile situation arise. The assailant’s access would be compartmentalized, and they could be hindered from crossing into additional areas.
Question B.34 : How is the Spider Blocker able to provide cable 'line supervision' monitoring?
Wiegand-based Card Reader “home run” cables are fully exposed, bearing no supervision whatsoever. This permits the potential for exploitation, without detection.
When the Spider Blocker is connected to a Normally Closed Tamper Switch (such as a Spider Tamper Switch), it opens up the capability into providing crucial monitoring & supervision of the cable.
Once set up: If the cable was to be cut/tampered anywhere in between the Reader and Control Panel, the Spider Blocker will be tripped into an Alarm and can be configured to alert Security of potential foul play.
Question B.35 : Does the Spider Blocker provide encryption?
No, it does not. But it also doesn’t need to.
The battle of encryption vs. decryption is a ‘never-ending arms race’.
Norton Antivirus was initially launched by Symantec in 1989. Even to this day: They still cannot fully guarantee that a protected PC can’t ever become infected or hacked into.
RSA 4096-Bit encryption was once considered unbreakable, but was successfully reverse-engineered in 2013 using a microphone.
The problem with encryption — is that it cannot ever be guaranteed to be free of potential decryption in the future.
Instead, we have designed the Spider Blocker to prohibit physical access onto operational data signal lines altogether… regardless of what signal types they may be carrying.
No access to “live signals” = No potential for manipulation.
Question C.01 : Why was the Spider Door Contact created?
We created the Spider Door Contact because reed switch door contacts, as overwhelmingly prevalent as they have been, are dangerously vulnerable!
They can be bypassed within seconds by a stronger magnet.
We developed the Spider Door Contact to provide maximum protection for the consumer, and to empower security professionals with a way to safeguard them most properly.
Question C.02 : How does the Spider Door Contact work?
The core component to our Spider Door Contact, is our patent-pending dual magnet design.
We labored for over 2 years and persevered through over 150+ design revisions in R&D to develop it & get it right.
The design consists of a magnet-driven conductive gimbal, that is guided into position by a 2nd (repelling) magnet installed on the door. A door opening would relieve that force.
The actions are all adjoined using our internal spider-hub assembly, and thus the typical “door is open” or “door is closed” signals are accomplished.
As the gimbal rests within its normal “door is closed” space: Any external magnetic forces (sensed from any other direction other than the door magnet itself), will cause the Spider Door Contact’s output to instantly trigger into an alarm.
Question C.03 : Can the Spider Door Contact utilize our existing door magnets?
Yes, it may be useable. But in order to do so, the existing magnet’s north pole must be facing upwards to our Spider Door Contact.
Troubleshooting tip: If you are experiencing reverse performance on the outputs, try flipping that existing magnet around.
Our recommendation is to always replace existing door magnets with our Spider Magnet Capsules. Here are some reasons on why:
1- Most existing magnets are made of Alnico V, which can easily become de-magnetized.
2- Spider Magnets take much less time to install.
3- Spider Magnets can accommodate easily onto almost any type of door.
4- Spider Magnets offer a patented adjustment feature, which will help to eliminate false alarms!
Question C.04 : Is the Spider Door Contact UL listed?
Not yet. We are currently in the process of achieving UL Certification for the Spider Door Contact.
Question C.05 : How do Spider Magnets improve installations?
In using them will save you time and money, every time.
Door Magnets offered by traditional manufacturers are extremely limited in application & adaptability. They create add unnecessary costs on each & every single instance of installation.
Example #1: For most interior doors, the installer might utilize up to 10 extra minutes per door, breaking apart the plastic casing and pulling the bare 3/8″ magnet out of it. Then they must mark their drill bit (tape measure, then electrical tape = more time spent) to ensure they do not drill too deep or too shallow. Drill too deep, and the sensor won’t see the magnet. Drill too shallow, and the door won’t close shut.
Example #2: For all exterior doors, typical door magnets do not adapt to these outside applications very easily at all! So installers typically have to drive (on the clock) to the nearest security supplier to furnish a “squeeze magnet” (an added cost) that can accommodate the top-channel cavities that nearly all exterior doors have. Hours of labor may be wasted here.
Our design alleviates all of these issues, and makes for an easy installation regardless of the door type. (With the lone exception being a ‘100% glass’ door).
Question C.06 : How can the Universal Cap & Magnet Capsule help eliminate false alarms?
All door contacts have gapping tolerances…typically between 1/4″ and 1/2″. When these limits are exceeded, false alarms will occur.
Our Universal Caps and Magnet Capsules enable installers into keeping magnets & corresponding door contacts to perfect distances.
Here’s how: When the Magnet Capsule is screwed into the Universal Cap, it’s threaded coupling design introduces a new groundbreaking feature— The Magnet Capsule can be vertically adjusted up & down!
-Turned counter-clockwise it can be brought closer to the door contact.
-Turned clockwise it can be brought further away from the door contact.
Why does this matter? Vertical adjustment capability is significant because post-installation: doors will always sag lower over time. This is a highly common problem that causes false alarms for security systems.
When traditional door magnets are used, they are permanently placed into position… offering ZERO adjustment. Our innovative design finally puts an end to this historic problem.
Question C.07 : Can a Universal Cap & Magnet Capsule work with other door contact sensors?
Yes, but we cannot guarantee full compatibility with all other brands.
Question C.08 : How is the Magnet Capsule better to use than bare 3/8" magnets?
Yes. Traditional magnets, which are cylinder-shaped, can fall into a door if the 3/8″ hole is drilled too deeply.
Our Magnet Capsule bears an oversized “head” that prevents it from falling too deep into the door, and situates the magnet perfectly, 100% of the time.
In addition, our Magnet Capsule is made of Neodymium Grade N42, one of the strongest magnets available and is not prone to demagnetization.
Question C.09 : Why is there a repelling force in between the Spider Door Contact and its Magnet?
Not to worry, this is normal.
The core of our internal design consists of dual ‘repelling’ Neo magnets.
As the door is shut, the 2 magnets will align and balance. (A physical synchronization will be established in between them, in a directional & discerning manner).
When the door is opened, this balance will be interrupted, triggering an alarm.
Question C.10 : Will the repelling magnet forces prevent my doors from closing?
No, the repelling force is very minimal and should not affect door closings.
Question C.11 : Should I be concerned with Spider Magnets becoming demagnetized?
No. There should be no concern for demagnetization. We use top-grade Neodymium magnets, which at their worst will lose only up to 1% of their magnetism after 10 years. (This loss is not enough to affect operation). Not to mention the loss would only occur if a single magnet was completely isolated & was not in regular contact with other magnets.
Question D.01 : What types of drill bits can be used with the Spider Drill Shield?
The Spider Drill Shield (Part # SSP-ACC-DRILLSHIELD-038) is designed to accommodate 3/8″ shanked drill bits.
Drill bit shanks must clear at least .75″ past the core bearing assembly.
Question D.02 : I am using a step bit with a 3/8" shank. How come it doesn't fit?
Unfortunately there are slight diameter size variables & tolerances, in what a manufacturer might build as a “3/8 inch” shank.
(Some of them are much larger than .375″).
Because of this, we cannot guarantee that every 3/8″ shank will be compatible with the Spider Drill Shield.
What we can guarantee, is that our Spider Step Bits will always fit into Spider Drill Shields.
Question D.03 : Can I use a hole-saw arbor (with a 3/8" shank) with the Spider Drill Shield?
It is likely to be incompatible, as holesaws typically require more cup depth.