We See You

We See You

Do you know who’s lurking beyond your cameras?

The last major advancement in commercial perimeter security was the introduction of CCTV cameras. While this technology addressed some of the surveillance needs associated with facility protection, it failed to fully address the challenges posed by threats outside of your immediate view.

Today, we continue to guard our facilities with fences, cameras, and access control systems, a growing market anticipated to be valued at $37.43 billion by the year 2021. But does this anticipated investment make sense, and does it really equate to better security than we currently have today?

The answer is no because current protection strategies focus too heavily on protecting a facility’s physical perimeter rather than protecting the facility itself. Until the industry alters course, money will continue to be wasted and vulnerabilities will continue to be exploited.

Securing a perimeter is about more than just the physical boundaries of your facility or asset. It means effectively being able to detect threat activity early enough to allow an effective response before you are at risk of suffering loss.

Traditional perimeter security measures are reactive, not proactive, which results in a rushed and ineffective threat response. While these solutions play an important role in defense, they are insufficient and must be augmented with other systems to improve their overall efficiency and effectiveness.

Thinking Ahead

A select number of organizations are beginning to think ahead and implement these proactive solutions. Less attention is being given to the latest and greatest technology, and more energy is being spent developing a security plan that provides an advance warning of threat activity.

The perimeter intrusion detection systems market, a subset of the larger physical security industry, is seeing continued growth as a result. It’s forecasted to reach $5.82 billion by 2021 with a compound annual growth rate of 7.1 percent over the 5 year period following 2016.

Driving factors for this transition include a growing risk of terrorism, continued problems with immigration, increased government regulation, advancements in video surveillance technology, and a desire to reduce the amount of man-hours needed for security. Traditionally, false alarm rates have been a limitation to the adoption of these intrusion detection systems but new technology is emerging to counter these perceptions.

While many security professionals are looking to adopt a more proactive security plan, there are countless organizations still caught in the past who should be rethinking their perimeter protection. Security strategies are not something that can be changed overnight. For these lagging organizations to truly be effective in providing security, they must understand threats better and do everything to get out in front, anticipate, and defend against their next move rather than the previous one.

Instead of adding more cameras or investing in traditional security solutions that provide a limited threat response, the goal should be to develop a new strategy and increase awareness of activity beyond the view of your fence or cameras.

Implementing an Approach

The major hurdle for organizations is implementing an approach that focuses on realistic, rather than hypothetical, threat behavior. Real-world threats today operate in ways designed to specifically counter most of the modern, overt security technologies available in the market.

To better understand the behavior and activities of real-world threats, it’s imperative to understand many of the misconceptions associated with protection of many of our protected facilities and assets.

Low level, insurgent-like behaviors, previously confined to United States’ conflicts in the Middle East, are now becoming more and more prevalent in countries and regions like the United States and Europe. Realworld threats employ creative and unconventional tactics that can only be understood by studying their specific tactics, techniques, and procedures. You cannot adequately protect your assets against such threats by using traditional red-teaming exercises and staff.

During recent conflicts in Iraq and Afghanistan, we have seen conclusive evidence that those seeking to do us harm will go to great lengths to learn what and where existing security measures have been put in place. With that information, threats can understand how to avoid and/or sabotage them with little to no chance of recourse.

Even though these are concepts understood by militaries and some security professionals, most organizations are still planning their protection around past attacks even if it’s not representative of what could happen today.

The 2013 sniper attack on the Metcalf transmission substation is a constant reminder of the type of attacks we are constantly up against. With some early reconnaissance, the attackers were able to quickly cause $50 million in damages and escape apprehension. Even with the amount of attention this received in the security world, utility providers and other organizations with highvalue facilities have done little to improve their protection.

Traditional perimeter security protection tends to follow the same methodology no matter what facility or asset you’re protecting. A fence surrounds your protected area, with cameras mounted at numerous positions. These cameras are deployed to focus on known routes and to reduce the amount of surrounding blind spots. Security personnel and sophisticated software monitor these cameras for movement and then react when necessary.

The key is that they detect and react too late. The detection and reaction sequence begins at the point where the threat is already in position to cause the most significant damage or harm.

The result, most of the time, is that facility security personnel end up watching the camera feeds showing the damage as it occurs rather than intervening early enough in the process to prevent it from ever occurring in the first place. To effectively secure and protect physical assets from attack and/ or sabotage, you must incorporate standoff capability into your protection plan. For a security solution to be effective, you cannot, knowingly or unknowingly, disregard the threat activities and behaviors that occur ‘before the bad’.

In the majority of perimeter security applications, cameras and other security solutions are often mounted on or in the vicinity of the ‘wall’ itself due to terrain and access limitations. This is especially true in urban areas with surrounding infrastructure or places with blind spots caused by vegetation and undulating terrain. Unfortunately, this limited protection that some facilities are constrained to adopt, has now become universal throughout the industry, no matter what the surrounding geography looks like.

The Protection Plan

This type of protection plan, relying on fences and cameras, also necessitates a certain amount of staff available at all times who can monitor cameras and respond to activity.

Security staff and expensive cameras are two of the most common assets you have in your facility’s protection architecture. Neither of these options will prove to be cost effective unless organizations learn to complement them with low-cost solutions designed specifically to make them more effective.

While this type of emphasis on “local” protection along your physical perimeter and last line of defense can create the perception of comfort and security in your solution, the reality is that it often creates a false sense of security that ultimately translates into less effective monitoring and response times by security staff.

Lessons learned during recent insurgent conflicts and counter-insurgency efforts have only magnified these flaws and misconceptions associated with the belief that bigger fences and more cameras somehow equates to more effective preventative security measures. There’s a reason why we no longer fight in castles surrounded by moats. It’s because points of vulnerability not only exist along your perimeter but also well beyond what many today consider protected areas.

Regardless of your efforts to heighten walls or construct barriers associated with your physical perimeter, there will always be vantage points or locations where you remain vulnerable. A more effective and proactive solution is one that allows you to monitor well beyond that perimeter and makes you aware of any threat-related activities long before the threat ever reaches the point where they are prepared to attack.

Advanced intrusion detection systems are emerging alongside the industry’s pivot towards more proactive security protection. With a reduced false alarm rate and other advancements, the issues associated with these systems are becoming a thing of the past.

Organizational Solutions

Footstep detection, at extended ranges, is a growing solution for many organizations looking to get an advanced warning of threats beyond their initial perimeter and protected areas. Ground sensors, employed in conjunction with traditional perimeter security approaches, provide a cost-effective way to implement a proactive strategy that ensures you remain one step ahead of your threat.

Many of the ground sensor systems today require cabling that inherently requires trenches to be dug in order to conceal the cables. The disturbed earth associated with the buried footprint of such sensor systems and associated cabling reveal a clear sign to your threat of how and with what, you are attempting to protect your assets.

Covert sensor systems exist today that employs no cabling at all, that when buried just below the surface of the ground, make it nearly impossible for threats to conduct surveillance on your facilities and assets. Deployed asymmetrically, these sensors not only transition your defensive posture from reactive to proactive, but also easily integrate with your existing security infrastructure cameras, radars, and other technology to make them more effective in their employment.

Securing one’s facility and/or assets against the ever-changing nature of threats requires that the security industry collectively begins to challenge the status quo and look outside the box in order to be more proactive in their efforts to reduce risk and prevent the infliction of any damage or harm.

This article originally appeared in the August 2017 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3