On the fence line - Good security means a layered approach

On The Fence Line

Good security means a layered approach; great security begins at the perimeter

On The Fence LineSusceptibility to an attack begins with an unprotected perimeter. In the past, an unprotected perimeter often meant the opportunity for myriad security breaches, loss of assets and the chance for loss of human life. Unfortunately, we’ve learned through catastrophic events that an unprotected perimeter claims lives and destroys assets; the threat of intrusions continues to be a major concern for critical infrastructures, government and military facilities, transportation hubs and major commercial centers.

In the past, sensor and surveillance systems were prone to “false positives” or nuisance alarms, with few options providing appropriate intrusion analysis, making it difficult for first responders to react in a timely manner. Today, there are numerous options for sensor and surveillance technologies available for perimeter security, satisfying even the most challenging security scenarios and easily integrating with existing systems and budget requirements.

Following is a brief overview of perimeter security considerations and new technologies available.

Considerations When Designing a Perimeter Security System

The key to appropriately protecting perimeters is tailoring the sensor and surveillance system to meet unique requirements of each individual site. Even the best sensors available on the market today will deliver less-than-best results if they are not properly tailored to the site.

  • What are the potential threats and/or asset protection objectives? Is the perimeter susceptible to threats that are airborne, waterborne, land-based or a combination of all three? Is the objective to protect lives, as is the case at a national park or sporting event, or to provide a solid foundation for protection and continuity of operations, as at major transportation hubs, ports and harbors? Understanding your threat/protect objectives presents unique challenges to protect a perimeter.
  • What do you want to protect/detect? An electrical grid? A busy airport with multiple borders? A historic site with high pedestrian traffic? After defining the unique protection challenges at each site, you can better understand the threats that are present that you need to protect against.
  • What are the operational climate conditions? Are extreme temperatures, high winds, driving rains, sand or blowing sea spray routinely part of the environment? For example, if the installation is in an area prone to high winds, make sure the system has advanced signal processing to prevent generating nuisance alarms during high wind gusts while maintaining full sensitivity to an intrusion.
  • At what range do you need to “see”? Understanding the range at which you need to be able to see your threat or intruder is critical, as is knowing how much advance notice is required to launch an appropriate response. Understanding these factors will help to create a working timeline for response. Defining what it means to “see a target” requires using Johnson criteria and distinguishing between degrees of “seeing.” For mere detection, you must determine the range needed to be able to detect if an object is present. Recognition involves actually seeing what type of object it is and being able to make the distinction between human, car, truck, animal or any other object. Identification, often used in the military, means seeing if someone is “friend or foe”—a threat or not. These measures need to be fully defined in order to select the proper sensor range and technology required.
  • What type of “boundaries” make up your perimeter—do they involve urban development, water, roadways, woods, open terrain, mountains, buildings, pedestrian traffic, animal activity or human activity? Clearly, each setting presents a unique set of challenges to ensure the perimeter is not violated by an outside threat and needs to be taken into consideration when designing a perimeter surveillance system.

Each perimeter situation has a set of unique environmental challenges that must be taken into consideration when selecting the sensors and designing and installing the system. Failing to take these factors into consideration can result in a spike in false-positive nuisance alarms and a possible unprotected perimeter.

Layered Defense

A fundamental aspect to securing perimeters is implementing a layered defense approach. The more layers or obstacles present, the more the intruder or threat needs to penetrate to reach his or her target, the higher the opportunity the threat will be detected, leaving the perimeter secure. Each of the individual layers or components needs to complement each other, working together to protect the perimeter against known and perceived threats.

Layers include deterrence, delaying, detection, assessment and response. Threat and disruption protection through deterrence includes fences, security guards and warning signs.

Reduction of asset damage through the use of delaying mechanisms includes fence lines and security staff.

Threat or disruption detection includes surveillance sensors, motion detectors and CCTV.

Incident assessment involves the appropriate response to incidents and determination of damage levels.

Response procedures might involve first responders and emergency response processes.

Fiber Optic Sensors

Fiber optic sensing systems are a relatively new technology but are quickly becoming a popular choice for perimeter security systems due to their proven performance over the past decade. These systems are a widely accepted choice for being easily available and highly tunable to compensate for environmental conditions in the field, such as extreme temperature and weather factors. These sensor systems do not require a power source; are resistant to lightning strikes, electromagnetic interference (EMI), radiofrequency interference (RFI) or other electrical signals; and can be used over long distances.

A zone-based fiber optic sensor system consists of a central processing unit— a based controller, installed on the fence line, and a fiber optic cable attached to the fence fabric and connected to the controller. Light from a laser is sent down the fiber, and the returned light is compared to determine if there are any “light pattern” changes resulting from the bending of the fiber optic cable caused by a disturbance on the fence line.

In a typical application, the fiber optic sensing cables are mounted directly to the fence line using twist ties. A fence in good condition and a solid fence installation are necessary for reliable detection. Fences that are free of holes, swaying posts, loose signs and vibrations will maximize the system performance. With zone-based systems, the more activity that exists around the fence, the lower the sensitivity setting for the system and the less likely the system will detect a threat or intruder.

Infrared Detection Systems

Infrared sensors detect energy generated by external sources, particularly the thermal energy given off by people in the infrared range. Active infrared sensors generate a beam of infrared energy and react to a change in the frequency or an interruption in the received energy when an intruder passes through the protected area. Infrared technology can be employed in unattended ground sensors (UGS) to provide added layers of security.

A UGS passive infrared device detects the thermal energy of an intruder, similar to a thermal camera, and can signal an alarm on the thermal movement. An active infrared sensor system is made up of a transmitter and a receiver. The transmitter emits a multiple frequency beam to the remote receiving unit, creating an “infrared fence” between the transmitter and the receiver. The receiver then converts the infrared energy into an electrical signal. The receiving unit monitors the electrical signal and generates an alarm when the signal drops below a preset threshold. An intruder passing through the protected area will interrupt the infrared signal, causing it to fall below the threshold, and generate an alarm.

Video Analytics

As a basic explanation, video analytics use computers to scan incoming video feeds and automatically identify items of interest without having a security operator constantly monitor the video. Common uses of video analytics are intrusion detection, monitoring people and traffic, detecting objects left behind, and license plate recognition, all key aspects of perimeter security.

Video analytics is a technology used to analyze video feed from a camera to monitor specific changes and behavior of the monitored area by comparing the current scene with a predetermined ambient scene of the area. When sufficient change in the image or behavior is detected by the video analytics, an alarm is generated and the intrusion scene is displayed at the monitoring station.

There have been significant advances in video analytics in recent years, with higher-quality systems now including an image-tracking feature that can monitor multiple and separate intruders simultaneously by drawing a different colored line around each intruder and creating a colored trail line of where he or she has been.

Clearly, there are many variables to consider when defining needs for a perimeter security system, and we’ve only scratched the surface of the technologies available. Starting by understanding the assets you are trying to protect and what you are trying to detect will lay the groundwork for defining the appropriate system for your unique perimeter surveillance needs.

This article originally appeared in the April 2012 issue of Security Today.

Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”