On the fence line - Good security means a layered approach

On The Fence Line

Good security means a layered approach; great security begins at the perimeter

On The Fence LineSusceptibility to an attack begins with an unprotected perimeter. In the past, an unprotected perimeter often meant the opportunity for myriad security breaches, loss of assets and the chance for loss of human life. Unfortunately, we’ve learned through catastrophic events that an unprotected perimeter claims lives and destroys assets; the threat of intrusions continues to be a major concern for critical infrastructures, government and military facilities, transportation hubs and major commercial centers.

In the past, sensor and surveillance systems were prone to “false positives” or nuisance alarms, with few options providing appropriate intrusion analysis, making it difficult for first responders to react in a timely manner. Today, there are numerous options for sensor and surveillance technologies available for perimeter security, satisfying even the most challenging security scenarios and easily integrating with existing systems and budget requirements.

Following is a brief overview of perimeter security considerations and new technologies available.

Considerations When Designing a Perimeter Security System

The key to appropriately protecting perimeters is tailoring the sensor and surveillance system to meet unique requirements of each individual site. Even the best sensors available on the market today will deliver less-than-best results if they are not properly tailored to the site.

  • What are the potential threats and/or asset protection objectives? Is the perimeter susceptible to threats that are airborne, waterborne, land-based or a combination of all three? Is the objective to protect lives, as is the case at a national park or sporting event, or to provide a solid foundation for protection and continuity of operations, as at major transportation hubs, ports and harbors? Understanding your threat/protect objectives presents unique challenges to protect a perimeter.
  • What do you want to protect/detect? An electrical grid? A busy airport with multiple borders? A historic site with high pedestrian traffic? After defining the unique protection challenges at each site, you can better understand the threats that are present that you need to protect against.
  • What are the operational climate conditions? Are extreme temperatures, high winds, driving rains, sand or blowing sea spray routinely part of the environment? For example, if the installation is in an area prone to high winds, make sure the system has advanced signal processing to prevent generating nuisance alarms during high wind gusts while maintaining full sensitivity to an intrusion.
  • At what range do you need to “see”? Understanding the range at which you need to be able to see your threat or intruder is critical, as is knowing how much advance notice is required to launch an appropriate response. Understanding these factors will help to create a working timeline for response. Defining what it means to “see a target” requires using Johnson criteria and distinguishing between degrees of “seeing.” For mere detection, you must determine the range needed to be able to detect if an object is present. Recognition involves actually seeing what type of object it is and being able to make the distinction between human, car, truck, animal or any other object. Identification, often used in the military, means seeing if someone is “friend or foe”—a threat or not. These measures need to be fully defined in order to select the proper sensor range and technology required.
  • What type of “boundaries” make up your perimeter—do they involve urban development, water, roadways, woods, open terrain, mountains, buildings, pedestrian traffic, animal activity or human activity? Clearly, each setting presents a unique set of challenges to ensure the perimeter is not violated by an outside threat and needs to be taken into consideration when designing a perimeter surveillance system.

Each perimeter situation has a set of unique environmental challenges that must be taken into consideration when selecting the sensors and designing and installing the system. Failing to take these factors into consideration can result in a spike in false-positive nuisance alarms and a possible unprotected perimeter.

Layered Defense

A fundamental aspect to securing perimeters is implementing a layered defense approach. The more layers or obstacles present, the more the intruder or threat needs to penetrate to reach his or her target, the higher the opportunity the threat will be detected, leaving the perimeter secure. Each of the individual layers or components needs to complement each other, working together to protect the perimeter against known and perceived threats.

Layers include deterrence, delaying, detection, assessment and response. Threat and disruption protection through deterrence includes fences, security guards and warning signs.

Reduction of asset damage through the use of delaying mechanisms includes fence lines and security staff.

Threat or disruption detection includes surveillance sensors, motion detectors and CCTV.

Incident assessment involves the appropriate response to incidents and determination of damage levels.

Response procedures might involve first responders and emergency response processes.

Fiber Optic Sensors

Fiber optic sensing systems are a relatively new technology but are quickly becoming a popular choice for perimeter security systems due to their proven performance over the past decade. These systems are a widely accepted choice for being easily available and highly tunable to compensate for environmental conditions in the field, such as extreme temperature and weather factors. These sensor systems do not require a power source; are resistant to lightning strikes, electromagnetic interference (EMI), radiofrequency interference (RFI) or other electrical signals; and can be used over long distances.

A zone-based fiber optic sensor system consists of a central processing unit— a based controller, installed on the fence line, and a fiber optic cable attached to the fence fabric and connected to the controller. Light from a laser is sent down the fiber, and the returned light is compared to determine if there are any “light pattern” changes resulting from the bending of the fiber optic cable caused by a disturbance on the fence line.

In a typical application, the fiber optic sensing cables are mounted directly to the fence line using twist ties. A fence in good condition and a solid fence installation are necessary for reliable detection. Fences that are free of holes, swaying posts, loose signs and vibrations will maximize the system performance. With zone-based systems, the more activity that exists around the fence, the lower the sensitivity setting for the system and the less likely the system will detect a threat or intruder.

Infrared Detection Systems

Infrared sensors detect energy generated by external sources, particularly the thermal energy given off by people in the infrared range. Active infrared sensors generate a beam of infrared energy and react to a change in the frequency or an interruption in the received energy when an intruder passes through the protected area. Infrared technology can be employed in unattended ground sensors (UGS) to provide added layers of security.

A UGS passive infrared device detects the thermal energy of an intruder, similar to a thermal camera, and can signal an alarm on the thermal movement. An active infrared sensor system is made up of a transmitter and a receiver. The transmitter emits a multiple frequency beam to the remote receiving unit, creating an “infrared fence” between the transmitter and the receiver. The receiver then converts the infrared energy into an electrical signal. The receiving unit monitors the electrical signal and generates an alarm when the signal drops below a preset threshold. An intruder passing through the protected area will interrupt the infrared signal, causing it to fall below the threshold, and generate an alarm.

Video Analytics

As a basic explanation, video analytics use computers to scan incoming video feeds and automatically identify items of interest without having a security operator constantly monitor the video. Common uses of video analytics are intrusion detection, monitoring people and traffic, detecting objects left behind, and license plate recognition, all key aspects of perimeter security.

Video analytics is a technology used to analyze video feed from a camera to monitor specific changes and behavior of the monitored area by comparing the current scene with a predetermined ambient scene of the area. When sufficient change in the image or behavior is detected by the video analytics, an alarm is generated and the intrusion scene is displayed at the monitoring station.

There have been significant advances in video analytics in recent years, with higher-quality systems now including an image-tracking feature that can monitor multiple and separate intruders simultaneously by drawing a different colored line around each intruder and creating a colored trail line of where he or she has been.

Clearly, there are many variables to consider when defining needs for a perimeter security system, and we’ve only scratched the surface of the technologies available. Starting by understanding the assets you are trying to protect and what you are trying to detect will lay the groundwork for defining the appropriate system for your unique perimeter surveillance needs.

This article originally appeared in the April 2012 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3