From Fences and Bollards

From Fences and Bollards

The stand-off threat detection: The evolving face of perimeter security

In the United States alone, there are around 230 military bases and globally, more than 700 U.S. installations—collectively amounting to more than 1.38 million troops that live and/or work on base. Consider the average major sporting event in the United States—it typically involves tens of thousands of spectators all of whom are entering a venue at one given time.

Due to the substantial amount of people in a set place, combined with countless entry points, military bases, event venues and government buildings have become a hotbed for potential terror threats. And while the threat of global terrorism has greatly increased awareness over the security of critical infrastructure, the need for effective perimeter control has never been more imperative.

Because of the sprawling nature of many military bases and event sites, they have become increasingly difficult to secure effectively—leaving these sites vulnerable to a wide range of threats. Trained guards combined with traditional perimeter security solutions (such as fences and surveillance systems) is simply no longer adequate to protect critical infrastructure or sensitive border zones from terror attacks, unauthorized entry or hostile penetration.

Today’s perimeter security must involve an integrated solution that can provide real-time information relays and an infrastructure that can work with both legacy equipment and the latest cutting edge solutions to combat the aggressive and ever-changing threat landscape.

Beyond a Fence: Developing an Integrated Perimeter

High-security fences, concrete security bollards and surveillance equipment may have been enough to cover the basic level of security needed previously, but in today’s threat climate security personnel need to realign their views of what should be included for a complete perimeter security strategy.

What agencies and organizations need to do is integrate solutions such as stand-off threat detection, cargo screening and non-intrusive detection to the perimeter security mix. While established solutions like fences, bollards and surveillance are still an integral part of the overall perimeter strategy and should continue to be used, additional solutions should be incorporated to provide security operators with a holistic view of the entire security landscape.

Successful border and perimeter protection requires unified communication capabilities and early warning systems. This, along with continuous real-time monitoring and control allows personnel to react immediately to events—day or night—providing them with the most time possible to mitigate threats. To do this, organizations need an integrated security system that allows them to monitor border perimeter, checkpoints, buildings, and compounds, anytime, and from a single location. Security solutions that are integrated into a seamless network of wide area surveillance and detection capabilities allow for real-time intrusion detection and situational awareness to be known from a given central command center.

And while this integration is key for efficiency, it’s not enough for just newly purchased and installed technologies to work together either—these pieces should also work with existing components of a security operation. Given ongoing budget cuts, starting a security concept from scratch is rarely an option— nor does it need to be. Legacy technologies hold a key position in the organization of a security strategy making it vital that the new can work with the old seamlessly.

Additionally, perimeter security technology should not only be easily adaptable for the changing threat landscape, but also should be able to grow or contract based on changing patterns and throughput. It’s likely that the Super Bowl will attract many more spectators than a typical regular season football game, which places an emphasis on increased throughput. The security strategy (and its associated strategies) must be able to adapt to this new demand in a reasonable period of time. Organizations need to ensure that all technologies considered for their security strategy can not only evolve to meet new threats, but also adapt to meet changes on the organizational end, like growing or shrinking traffic demands.

Next Generation Solutions

Integrated perimeter security is the best bet when it comes to protecting critical infrastructure against a range of threats and hostile penetration. However, even with the advanced solutions that exist today, some of the most challenging aspects of perimeter security have yet to be solved.

For example: If a truck is driving towards a perimeter at 30 miles per hour, security personnel have a mere 3 to 4 seconds to decide if the truck needs to be neutralized. It becomes a nearly impossible decision every time and unfortunately there is no existing solution to help better guide security staff to what their best course of action should be.

However, one capability that does exist as of recent years is a solution to detect person-borne IEDs. In 2013, eighteen countries suffered the lethal results of suicide terrorism. Some 291 suicide bombings were carried out, causing approximately 3,100 deaths. That number represents a 25 percent increase in the number of attacks over the same period the previous year.

Thankfully, technology that can help combat that issue exists, has been extensively tested by the U.S. government and has been successfully deployed by the U.S. Armed Forces in all recent major conflicts, as well as other volatile areas around the globe, since 2008.

Radar-based threat detection solutions can identify concealed personborne threats such as suicide vests and weapons—all at stand-off distances, providing security operators with valuable time to decipher and neutralize the threat. Using optional remote networking capabilities, today’s stand-off detection solution features state-of-the-art video steered radar technology that can identify a threat even when the system operator is hundreds of miles away.

Not limited to suicide vests, one known system of this type can also detect other concealed threats such as handguns, machine pistols, pipe bombs and grenades, making it an ideal solution for perimeter security at high-profile locations such as government buildings, transit systems and military installations.

Preparing for a Secure Future

While many challenges have yet to be answered when it comes to perimeter security, we no longer are limited to antiquated solutions that only paint a modicum of the full security picture that is needed. With an integrated solution, these new technologies can be combined with legacy systems already in place to combat problems that didn’t have a viable solution in the past and future proof an organization for solutions that are to come.

By creating a perimeter security strategy that takes into account the full security landscape and assimilating all solutions together, organizations can now communicate issues with enough time for something to be done about it before the threat causes harm.

This article originally appeared in the April 2015 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3