Multi-dimensional perimeter ­security

Access & Identity Management Handbook 2015 Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection

Is an electric fence enough to keep the criminal element out of private and business premises or are businesses demanding additional technology? Technews spoke to industry specialists about the current trends in perimeter security and found that a multi-dimensional approach is preferred.

Puffer Hartzenberg, managing director of ELF Rentals, says that a high quality electric fence remains one of the few barriers to satisfy all three essential prerequisites of a perimeter security solution: deter, detect and delay.

He says that since many installations lack a reliable detection mechanism, the trends have been to bolt on additional forms of detection and monitoring. Reliable detection is the key to successful perimeter security, allowing resources to be deployed to a breach in an efficient and timeous manner. This further enhances the deterrent value of an installation.

He continues that ideally you want to be aware of the location of a breach at the time that the attempt is being made, if not before. Modern electric fence energisers have on-board return (feedback) voltage monitoring and can easily be networked to provide real-time information to monitoring stations. Control room type software allows trend analysis and a hierarchical report and alerting systems.

Hartzenberg cautions that current trends for new installations are favouring expensive mesh type fencing which he claims provide an impressive looking finish but are sadly lacking in all three of the ‘Ds’, with only a portable angle grinder required to successfully breach a perimeter.

Brendon Cowley, business development director at C3.
Brendon Cowley, business development director at C3.

Brendon Cowley, business development director at C3, says that customers are no longer content with just an electric fence for the very reason that as much as it may delay an intruder, it offers no situational awareness of the intrusion or the ability to identify the threat.

Philip Smerkowitz, managing director of TeleEye.
Philip Smerkowitz, managing director of TeleEye.

Philip Smerkowitz, managing director of TeleEye, says that the extent of the perimeter system is driven primarily by budget with the electric fence forming the foundation and add-ons such as lighting and cameras being based on individual cost constraints.

Video verification

He says that a staged approached should be employed that considers specific elements in a comprehensive risk assessment. He refers to the mining and property management space where companies are adding additional items such as thermal imaging cameras with analytics, providing a detection and verification mechanism, to their existing perimeter security. This is especially dominant on longer perimeters where inadequate lighting becomes an issue.

Another trend he cites include remote offsite alarm verification of perimeter installations, which reduces the guarding component and improves general security. Fibre optic intrusion detection, long-range passive infrared devices, radar technology and newly released short-range thermal cameras for smaller installations are other supplementary security devices.

Hartzenberg says that add-on detection systems fall into two main categories: vibration sensing and visual monitoring.

There are a plethora of vibration sensing systems available which can provide decent detection and they typically rely on a sensitive monitoring device attached to the fence infrastructure at regular intervals, with a linking cable right around the perimeter.

Some of the newer systems deploy fuzzy logic and can discern between heavy impact, repeated hammering and high-frequency vibration, like cutting. Several methods are used to indicate the source of the interference to the monitoring station. However they are primarily detection devices and need to be deployed with backup guarding, which is expensive.

“Secondly, CCTV, including thermal, infrared and regular cameras have developed tremendously in the last few years and are being very successfully deployed to monitor perimeters. Thermal systems are expensive to implement. Advances in low-light visual systems and on-board camera detection methods have been particularly notable. The new-generation low-light cameras are well priced and very impressive. CCTV solutions rely on a solid communications link back to the monitoring station, be it copper, fibre or Wi-Fi and the requisite trained operators for monitoring,” adds Hartzenberg.

He feels that the ongoing development of visual cameras systems will dominate the progress of perimeter security solutions in the next few years.

Fibre detection

Photo source: Flickr Creative Commons, Amanda Slater, (https://www.flickr.com/photos/pikerslanefarm/12286367285/).
Photo source: Flickr Creative Commons, Amanda Slater, (https://www.flickr.com/photos/pikerslanefarm/12286367285/).

Smerkowitz says that the use of fibre optic detection systems are popular amongst higher risk sites. They consist of fibre optic cables mounted to a fence or wall which are connected to processors which monitor the light transmission patterns through the fibre cable. As the cable moves due to vibration, the light pattern changes and the processor unit using sophisticated algorithms, analyses the change in transmission pattern, filtering out changes due to wind or other unwanted signals and produces an alarm signal.

Hartzenberg adds that most sensors rely on a solid state accelerometer that responds to various vibrations detected on the fence hardware. If installed correctly they will enhance the detection ability of a perimeter solution but reliability remains cause for concern.

Both fibre systems and vibration systems typically rely on a single ring main link for communication and determining the locality of a potential breach. In the case of fibre, any damage to the cable can result in significant delays in restoring the link due to the complexity of splicing fibre cables. Furthermore, a single pre-emptive cut with a pair of sidecutters can render the entire perimeter vulnerable as the sensors are typically run in a daisy chain configuration.

Cowley adds that the installation of these systems depends critically on two factors, namely what material is used for the perimeter structure, for example a concrete wall, a flimsy wire fence or a sturdy electric fence. “The second factor is how well the vibration detection solution is ‘bonded’ to this perimeter structure. If these two factors are handled appropriately then the solution will be reliable and will work well. However, this technology will not identify the threat or offer any sort of situational awareness such as that offered by cameras installed with video analytics.”

Feeling the heat

Thermal cameras have gained a following over the past few years due to their ability to detect heat emitting objects in the total absence of light. This, says Smerkowitz, makes them the perfect add-on element for perimeter security where they are able to detect a presence over long distances in even the most inclement environmental conditions.

He is of the opinion that the initial purchase price on thermal cameras should not be the only determinant when considering costs. He explains that due to the range of thermal cameras, they can be installed at longer intervals than other surveillance cameras, typically on a 1:6 (per 300 metre) comparative ratio.

He points out that thermal imaging cameras are becoming more affordable, with no discernible price increases over the past couple of years and in some instances a 40% decrease on the cost of premium models. In addition, a lower cost, shorter range version is now available for the budget conscious user with smaller perimeters. Developments in HD thermal cameras, with higher resolution images are on the cards for the future, while better bandwidths for remote monitoring will increase the efficacy of the systems.

Hartzenberg and Cowley underline the advantages of thermal cameras, saying that they can detect movement at 880 m, recognise the shape of threat at 225 m and positively identify at a mere 112 m. The technology has, in the last few years, become more mainstream and is no longer considered military grade. However, as a cautionary note, this also means that the market is now opened up to inferior products so one needs to ensure that the brand used is a reliable and reputable one.

The nuts and bolts

Before any decisions are made with regard to perimeter security requirements, a detailed risk assessment needs to be performed. This will be contingent upon a site survey and the goals of the client. Determining factors include budget and analysis and an understanding of the movement and volume of people through the premises.

Hartzenberg breaks it down into eight steps. Firstly, a thorough reference check should be performed on the service provider. Secondly the perimeter needs to be broken down into zones based on both the length and risk profile, with higher risk areas being shorter in length.

One needs to determine whether there is risk of burrowing and then to consider an anti-burrowing solution. One also needs to ensure that the height of the fence is suited to the determined risks and that the spacing of both the intermediate supports (1.5-3.0 m) and the wiring spacing (75-100 mm) is such that any breach is severely hampered.

The right materials need to be selected relative to the conditions, for example, galvanised versus stainless steel. The goal should be to use the best IP energisers available that can be interrogated and managed remotely. The final step is reaching agreement with the installer regarding a maintenance plan, which holds the installer accountable for defective installation or materials.

For more information contact:

C3 Shared Services, +27 (11) 312 2041, [email protected], www.c3ss.com

Elf Rentals, +27 (0)41 368 3701, www.elfrentals.co.za

TeleEye (South Africa), +27 (0)11 557 9200, www.TeleEye.com

Thermal perimeters

Flir’s Theresa Turner discusses the applicability of thermal cameras to perimeter solutions.

What are the latest trends in perimeter security?

People are generally looking for the best technical solution at an affordable price. Thermal cameras offer a solution that will create alarms and produce images in complete darkness and in most weather conditions. Why not detect intruders, create an alarm and have visual verification?

What can be added to the traditional fence to improve security?

Mechanical protection of a perimeter is a solution but can be defeated relatively easily. The use of thermal cameras in combination with analytics will provide an alarm when an intruder compromises a perimeter and will also provide visual verification. The benefits are that you need fewer thermal cameras than visual CCTV cameras, there is no light pollution, the energy consumption is less as is the installation cost.

What processes should a customer go through when designing a perimeter solution?

A consideration should be given to the level of security needed. If you have valuable assets and you need to generate alarms when a perimeter in compromised then thermal cameras with analytics if a good solution. The next stage is to plan the layout of the cameras this can be done using the FLIR site planning tool http://content.flircs.com/sitebuilder. Also, due

consideration should be given to a suitable analytics supplier.

How does one incorporate the increased cost of thermals into a perimeter solution?

The cost of thermal cameras has reduced considerably in recent years. Their use can be easily justified as thermal cameras cover larger areas than CCTV cameras, some products will detect a man at 20 km. As fewer cameras are used the installation cost is less. In addition, the power consumption is very low for thermal cameras as there is no illumination needed.

FLIR sell a complete range of thermal cameras, in addition there is a full selection of visible CCTV cameras and recorders.

For more information contact FLIR Systems, +44 (0)1622 814742, [email protected], www.flir.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Three thousand design drawings as a starting point
C3 Shared Services Fire & Safety
C3 Shared Services was tasked with the design of a fire detection system, which factored in a longevity of at least 15 years. The detailed engineering and design project encompassed over 3000 design drawings and calculation sheets.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
The AX Hybrid PRO Series offers reliable wired and wireless protection
Hikvision South Africa Editor's Choice Perimeter Security, Alarms & Intruder Detection Products & Solutions
Hikvision has announced the launch of a new AX Hybrid PRO alarm system with innovative Hikvision ‘Speed-X’ transmission technology. This system offers reliable wired protection while delivering expanded flexibility with seamless wireless integration.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...