From Fences and Bollards

From Fences and Bollards

The stand-off threat detection: The evolving face of perimeter security

In the United States alone, there are around 230 military bases and globally, more than 700 U.S. installations—collectively amounting to more than 1.38 million troops that live and/or work on base. Consider the average major sporting event in the United States—it typically involves tens of thousands of spectators all of whom are entering a venue at one given time.

Due to the substantial amount of people in a set place, combined with countless entry points, military bases, event venues and government buildings have become a hotbed for potential terror threats. And while the threat of global terrorism has greatly increased awareness over the security of critical infrastructure, the need for effective perimeter control has never been more imperative.

Because of the sprawling nature of many military bases and event sites, they have become increasingly difficult to secure effectively—leaving these sites vulnerable to a wide range of threats. Trained guards combined with traditional perimeter security solutions (such as fences and surveillance systems) is simply no longer adequate to protect critical infrastructure or sensitive border zones from terror attacks, unauthorized entry or hostile penetration.

Today’s perimeter security must involve an integrated solution that can provide real-time information relays and an infrastructure that can work with both legacy equipment and the latest cutting edge solutions to combat the aggressive and ever-changing threat landscape.

Beyond a Fence: Developing an Integrated Perimeter

High-security fences, concrete security bollards and surveillance equipment may have been enough to cover the basic level of security needed previously, but in today’s threat climate security personnel need to realign their views of what should be included for a complete perimeter security strategy.

What agencies and organizations need to do is integrate solutions such as stand-off threat detection, cargo screening and non-intrusive detection to the perimeter security mix. While established solutions like fences, bollards and surveillance are still an integral part of the overall perimeter strategy and should continue to be used, additional solutions should be incorporated to provide security operators with a holistic view of the entire security landscape.

Successful border and perimeter protection requires unified communication capabilities and early warning systems. This, along with continuous real-time monitoring and control allows personnel to react immediately to events—day or night—providing them with the most time possible to mitigate threats. To do this, organizations need an integrated security system that allows them to monitor border perimeter, checkpoints, buildings, and compounds, anytime, and from a single location. Security solutions that are integrated into a seamless network of wide area surveillance and detection capabilities allow for real-time intrusion detection and situational awareness to be known from a given central command center.

And while this integration is key for efficiency, it’s not enough for just newly purchased and installed technologies to work together either—these pieces should also work with existing components of a security operation. Given ongoing budget cuts, starting a security concept from scratch is rarely an option— nor does it need to be. Legacy technologies hold a key position in the organization of a security strategy making it vital that the new can work with the old seamlessly.

Additionally, perimeter security technology should not only be easily adaptable for the changing threat landscape, but also should be able to grow or contract based on changing patterns and throughput. It’s likely that the Super Bowl will attract many more spectators than a typical regular season football game, which places an emphasis on increased throughput. The security strategy (and its associated strategies) must be able to adapt to this new demand in a reasonable period of time. Organizations need to ensure that all technologies considered for their security strategy can not only evolve to meet new threats, but also adapt to meet changes on the organizational end, like growing or shrinking traffic demands.

Next Generation Solutions

Integrated perimeter security is the best bet when it comes to protecting critical infrastructure against a range of threats and hostile penetration. However, even with the advanced solutions that exist today, some of the most challenging aspects of perimeter security have yet to be solved.

For example: If a truck is driving towards a perimeter at 30 miles per hour, security personnel have a mere 3 to 4 seconds to decide if the truck needs to be neutralized. It becomes a nearly impossible decision every time and unfortunately there is no existing solution to help better guide security staff to what their best course of action should be.

However, one capability that does exist as of recent years is a solution to detect person-borne IEDs. In 2013, eighteen countries suffered the lethal results of suicide terrorism. Some 291 suicide bombings were carried out, causing approximately 3,100 deaths. That number represents a 25 percent increase in the number of attacks over the same period the previous year.

Thankfully, technology that can help combat that issue exists, has been extensively tested by the U.S. government and has been successfully deployed by the U.S. Armed Forces in all recent major conflicts, as well as other volatile areas around the globe, since 2008.

Radar-based threat detection solutions can identify concealed personborne threats such as suicide vests and weapons—all at stand-off distances, providing security operators with valuable time to decipher and neutralize the threat. Using optional remote networking capabilities, today’s stand-off detection solution features state-of-the-art video steered radar technology that can identify a threat even when the system operator is hundreds of miles away.

Not limited to suicide vests, one known system of this type can also detect other concealed threats such as handguns, machine pistols, pipe bombs and grenades, making it an ideal solution for perimeter security at high-profile locations such as government buildings, transit systems and military installations.

Preparing for a Secure Future

While many challenges have yet to be answered when it comes to perimeter security, we no longer are limited to antiquated solutions that only paint a modicum of the full security picture that is needed. With an integrated solution, these new technologies can be combined with legacy systems already in place to combat problems that didn’t have a viable solution in the past and future proof an organization for solutions that are to come.

By creating a perimeter security strategy that takes into account the full security landscape and assimilating all solutions together, organizations can now communicate issues with enough time for something to be done about it before the threat causes harm.

This article originally appeared in the April 2015 issue of Security Today.


  • Report: 15 Percent of All Emails Sent in 2023 Were Malicious

    VIPRE Security Group recently released its report titled “Email Security in 2024: An Expert Look at Email-Based Threats”. The 2024 predictions for email security in this report are based on an analysis of over 7 billion emails processed by VIPRE worldwide during 2023. This equates to almost one email for everyone on the planet. Of those, roughly 1 billion (or 15%) were malicious. Read Now

  • ASIS Announces ANSI-Approved Cannabis Security Standard

    ASIS International, a leading authority in security standards and guidelines, proudly announces the release of a pioneering American National Standards Institute (ANSI)-approved standard dedicated to cannabis security. This best-in-class standard, meticulously developed by industry experts, sets a new benchmark by providing comprehensive requirements and guidance for the design, implementation, monitoring, evaluation, and maintenance of a cannabis security program. Read Now

  • ISC West Announces Keynote Lineup

    ISC West, in collaboration with premier sponsor the Security Industry Association (SIA), announced this year’s dynamic trio of speakers that will headline the Keynote Series at ISC West 2024. Read Now

    • Industry Events
  • Government is Top Targeted Industry for DDoS Attacks in Q4 2023

    The government sector experienced a surge of DDoS attacks in Q4 according to Lumen Technologies (NYSE: LUMN), a global leader in integrated network and cybersecurity solutions. The Lumen Quarterly DDoS & Application Threat Report for Q4 2023 analyzes data from its DDoS mitigation platform and application protection partner, ThreatX, to provide an overview of the DDoS and application-layer attacks that targeted organizations in the last quarter of 2023. Read Now

Featured Cybersecurity


New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3