High Flying Security

High Flying Security

Focusing on the perimeter equally as important as the front gate

There are not many topics that can invoke more mass fear in the general public than threats against major U.S. airports. As portrayed in the media and the average traveler’s mind, the primary threat lies inside the terminal where security officials are constantly on high alert for concealed weapons, explosives and other banned materials. Conversely, as airport officials are aware, there is another and perhaps more apparent threat at airports.

The Airport Perimeter

Strengthening perimeter security at airports provides a solid foundation for protection of lives and continuity of operations. As threats against airports continue to evolve, airport perimeter security requires constant evaluation for appropriate response planning, as well as enhanced surveillance and security technologies available.

Commercial airports are one of the major hubs of U.S. transportation. The Federal Aviation Administration classifies 546 airports as “commercial service” airports. The top 10 U.S. airlines operate more than 400,000 commercial flights each month and more than 30,000 commercial flights each day.

Most U.S. airports, runways and terminals were built decades ago, when security requirements were immensely unlike those needed today. Since 9/11, installing networked surveillance systems, including long- and short-range radars, thermal imaging cameras and video monitoring, has proven to be the most comprehensive way to detect intruders, unauthorized vehicles and low-flying aircraft to preserve human life and provide continuity of operations.

Current State of Perimeter Security

Today’s modern airports have become self-contained urban-esque “cities,” with roadways, passages, buildings and myriad of intertwined pedestrians and vehicles. Combine that with the reality that no two airport perimeters are alike; each has unique borders, including roads, rural areas, waterways, coastlines and urban borders. This presents a distinctive security and surveillance challenge to ensure the safety of the “city.”

The role of any perimeter security system is the perimeter fence and the perimeter intrusion detection system (PIDS) with its response mechanism, together acting as the first level of site protection.

Unprotected perimeters mean unprotected assets, unprotected people, and, inevitably, security breaches. The most commonly used perimeter security measure at airports, even since Sept. 11, 2001, are fence lines, fence alarms and mobile security vehicles monitoring the various boundaries, which have been easily breached in several instances in the past decade. Any security system is only as strong as its weakest link. The smart intruders rarely defeat the sensors or PIDS. Instead, they rely on poor alarm response procedures and mechanisms—the human element— to avoid getting caught.

For example, in 2009, the driver of a suspected stolen truck led police on a wild chase on the tarmac of the Sky Harbor Airport in Phoenix, Ariz., after the vehicle penetrated airfield security by crashing through two chain-link perimeter fences and weaving between planes. The vehicle was seen driving up alongside loaded commercial jets in the process of taxiing for take-off. As the driver was taken into custody, authorities scrambled to figure out how he managed to simply drive onto the sensitive tarmac area, which is dotted with billions of dollars worth of aircraft and hundreds of people.

During the summer of 2004, a driver swerved his car off the perimeter road, penetrated a cyclone fence and found himself inside the secure perimeter of Midway Airport in Chicago, Ill. This was an accident. If that driver, or the driver of the stolen truck in Phoenix, had been a terrorist with a truckload of explosives and had headed for the terminal building, an airplane loaded with fuel, or the airport fuel farm, results would have been tragic.

In August 2010, Australian authorities investigated a security breach at Melbourne Airport. The intruder climbed a barbwire fence completely undetected before dawn on July 24, into the “airside” security area, and then walked to the Virgin Blue hanger. He then pulled on a pair of staff overalls, stole a vehicle and drove for some time within the secure area of the airport that encompasses the landing strip and terminal areas before being noticed and arrested.

Airport perimeter security is primarily the responsibility of airport operators, so without federal regulations, each airport is left determining its own security needs. Until mandated or legislated by government, or becoming a victim of a security breach themselves, many commercial airports will continue to limit their perimeter security to patrolling security guards and a fence line.

Surveillance and Security Options: What to Look For, What’s Available

Airport security staff have an unenviable job; they must not only be aware that a security breach has occurred but must be able to quickly assess the threat level, immediately implement an emergency response plan and continually monitor threat movement.

A PIDS’s main goal is to detect threats, deter threats, assess situations and implement appropriate action. As stated above, the most universal perimeter security at airports is the installation of fence and gate systems and fence alarms.

Though they are a critical first deterrent, there are several problems with fence and fence alarm systems as the main source for airport security. The first issue is when a fence alarm sounds, the security breach has already occurred; the second issue is fence alarms are prone to false alarms (i.e., animals, wind, human error); the third problem is no video tracking or continual monitoring of the situation.

These issues present challenges from a response standpoint. Before an appropriate emergency response plan can be implemented, airport security officials need more information in order to react appropriately; they need to know what type of threat has occurred, from what direction the threat is coming and what direction it is headed and if lives are in immediate jeopardy. Meanwhile, they must constantly monitor the threat. While fences and fence alarms are important in threat deterrence, they are not a stand-alone solution.

The last decade has seen new and substantial advancement in PIDS technologies, increasing the reliability and accuracy of probability of detection (POD), lowering the number of nuisance and false alarms, and greatly improving their performance (differentiating between intruders and environmental disturbances).

Implementing a multilayered defense PIDS program is the optimal approach to deterring outside threats, preserving assets and ensuring uninterrupted operations. Every airport should have a comprehensive threat analysis that identifies the nature and appropriate response for potential threats. Ideally, a 360-degree comprehensive perimeter coverage to rapidly identify and assess threats is needed. An effective system should include a combination of sensors, CCTV cameras, thermal imagers, all-weather radars and appropriate detection strategies for the terrain and potential threats. Thought must be given to response strategies, including the appropriate agency; airport security, local law enforcement, and firefighter notifications should be integrated into a Computer-Aided Dispatch (CAD) system. Multiple responders require access to a central command and control center, which can be challenging both technologically and procedurally. Thought must be given to data dissemination and transmission technologies for first responders and methods for establishing a clear chain of command.

Being able to use networked surveillance systems, including long- and short-range radars, thermal imaging cameras and video monitoring, is the most comprehensive solution to detect intruders, unauthorized vehicles and unidentified aircraft at large U.S. airports, but small airports need perimeter protection, too. One of the most deadly intruders at small airports is wildlife. Deer, coyote, geese and other wildlife are the source of many accidents and could potentially be thwarted with the proper technology. Thermal imagers are particularly effective in detection of wildlife on airport grounds and can effectively be used as a warning to air traffic. Virtual access can provide airport operators with interrogation capabilities from offsite locations for remote airports that are unstaffed during certain periods of their operations.

The Port Authority of New York/New Jersey Airports

The New York Port Authority Airports have a unique challenge of water borders, land borders and fence lines to protect from intrusion and ever-changing outside threats, as well as being the “center of the universe” for international and domestic travel.

Keeping these issues at the forefront, the port embarked on a project to install integrated security and surveillance systems, providing 360-degree surveillance capability at the four airports in its PIDS program. With a suite of cameras and surveillance systems installed around the four airports under the port authority’s jurisdiction, all of the information is fed real-time to a series of command and control centers around the airports for 24/7 monitoring and response assessment.

Where are We Headed? What should we Look Out For?

Global social and political instability with the ongoing threat of terrorism will continue to drive the need to both fund and enforce regulation and legislation regarding perimeter security at U.S commercial airports, as well as at nuclear power stations, water reservoirs, data centers, transportation hubs and historic landmarks.

Legislation will continue to play a major role in the growth of perimeter security equipment along with stimulus monies and other regulation. Research estimates that global spending on electronic perimeter security equipment will reach $402 million in 2011, a 5 percent increase over 2010.

This article originally appeared in the January 2012 issue of Security Today.

Featured

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.