Multi-dimensional perimeter ­security

November 2015 Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection

Is an electric fence enough to keep the criminal element out of private and business premises or are businesses demanding additional technology? Technews spoke to industry specialists about the current trends in perimeter security and found that a multi-dimensional approach is preferred.

Puffer Hartzenberg, managing director of ELF Rentals, says that a high quality electric fence remains one of the few barriers to satisfy all three essential prerequisites of a perimeter security solution: deter, detect and delay.

He says that since many installations lack a reliable detection mechanism, the trends have been to bolt on additional forms of detection and monitoring. Reliable detection is the key to successful perimeter security, allowing resources to be deployed to a breach in an efficient and timeous manner. This further enhances the deterrent value of an installation.

He continues that ideally you want to be aware of the location of a breach at the time that the attempt is being made, if not before. Modern electric fence energisers have on-board return (feedback) voltage monitoring and can easily be networked to provide real-time information to monitoring stations. Control room type software allows trend analysis and a hierarchical report and alerting systems.

Hartzenberg cautions that current trends for new installations are favouring expensive mesh type fencing which he claims provide an impressive looking finish but are sadly lacking in all three of the ‘Ds’, with only a portable angle grinder required to successfully breach a perimeter.

Brendon Cowley, business development director at C3.
Brendon Cowley, business development director at C3.

Brendon Cowley, business development director at C3, says that customers are no longer content with just an electric fence for the very reason that as much as it may delay an intruder, it offers no situational awareness of the intrusion or the ability to identify the threat.

Philip Smerkowitz, managing director of TeleEye.
Philip Smerkowitz, managing director of TeleEye.

Philip Smerkowitz, managing director of TeleEye, says that the extent of the perimeter system is driven primarily by budget with the electric fence forming the foundation and add-ons such as lighting and cameras being based on individual cost constraints.

Video verification

He says that a staged approached should be employed that considers specific elements in a comprehensive risk assessment. He refers to the mining and property management space where companies are adding additional items such as thermal imaging cameras with analytics, providing a detection and verification mechanism, to their existing perimeter security. This is especially dominant on longer perimeters where inadequate lighting becomes an issue.

Another trend he cites include remote offsite alarm verification of perimeter installations, which reduces the guarding component and improves general security. Fibre optic intrusion detection, long-range passive infrared devices, radar technology and newly released short-range thermal cameras for smaller installations are other supplementary security devices.

Hartzenberg says that add-on detection systems fall into two main categories: vibration sensing and visual monitoring.

There are a plethora of vibration sensing systems available which can provide decent detection and they typically rely on a sensitive monitoring device attached to the fence infrastructure at regular intervals, with a linking cable right around the perimeter.

Some of the newer systems deploy fuzzy logic and can discern between heavy impact, repeated hammering and high-frequency vibration, like cutting. Several methods are used to indicate the source of the interference to the monitoring station. However they are primarily detection devices and need to be deployed with backup guarding, which is expensive.

“Secondly, CCTV, including thermal, infrared and regular cameras have developed tremendously in the last few years and are being very successfully deployed to monitor perimeters. Thermal systems are expensive to implement. Advances in low-light visual systems and on-board camera detection methods have been particularly notable. The new-generation low-light cameras are well priced and very impressive. CCTV solutions rely on a solid communications link back to the monitoring station, be it copper, fibre or Wi-Fi and the requisite trained operators for monitoring,” adds Hartzenberg.

He feels that the ongoing development of visual cameras systems will dominate the progress of perimeter security solutions in the next few years.

Fibre detection

Photo source: Flickr Creative Commons, Amanda Slater, (https://www.flickr.com/photos/pikerslanefarm/12286367285/).
Photo source: Flickr Creative Commons, Amanda Slater, (https://www.flickr.com/photos/pikerslanefarm/12286367285/).

Smerkowitz says that the use of fibre optic detection systems are popular amongst higher risk sites. They consist of fibre optic cables mounted to a fence or wall which are connected to processors which monitor the light transmission patterns through the fibre cable. As the cable moves due to vibration, the light pattern changes and the processor unit using sophisticated algorithms, analyses the change in transmission pattern, filtering out changes due to wind or other unwanted signals and produces an alarm signal.

Hartzenberg adds that most sensors rely on a solid state accelerometer that responds to various vibrations detected on the fence hardware. If installed correctly they will enhance the detection ability of a perimeter solution but reliability remains cause for concern.

Both fibre systems and vibration systems typically rely on a single ring main link for communication and determining the locality of a potential breach. In the case of fibre, any damage to the cable can result in significant delays in restoring the link due to the complexity of splicing fibre cables. Furthermore, a single pre-emptive cut with a pair of sidecutters can render the entire perimeter vulnerable as the sensors are typically run in a daisy chain configuration.

Cowley adds that the installation of these systems depends critically on two factors, namely what material is used for the perimeter structure, for example a concrete wall, a flimsy wire fence or a sturdy electric fence. “The second factor is how well the vibration detection solution is ‘bonded’ to this perimeter structure. If these two factors are handled appropriately then the solution will be reliable and will work well. However, this technology will not identify the threat or offer any sort of situational awareness such as that offered by cameras installed with video analytics.”

Feeling the heat

Thermal cameras have gained a following over the past few years due to their ability to detect heat emitting objects in the total absence of light. This, says Smerkowitz, makes them the perfect add-on element for perimeter security where they are able to detect a presence over long distances in even the most inclement environmental conditions.

He is of the opinion that the initial purchase price on thermal cameras should not be the only determinant when considering costs. He explains that due to the range of thermal cameras, they can be installed at longer intervals than other surveillance cameras, typically on a 1:6 (per 300 metre) comparative ratio.

He points out that thermal imaging cameras are becoming more affordable, with no discernible price increases over the past couple of years and in some instances a 40% decrease on the cost of premium models. In addition, a lower cost, shorter range version is now available for the budget conscious user with smaller perimeters. Developments in HD thermal cameras, with higher resolution images are on the cards for the future, while better bandwidths for remote monitoring will increase the efficacy of the systems.

Hartzenberg and Cowley underline the advantages of thermal cameras, saying that they can detect movement at 880 m, recognise the shape of threat at 225 m and positively identify at a mere 112 m. The technology has, in the last few years, become more mainstream and is no longer considered military grade. However, as a cautionary note, this also means that the market is now opened up to inferior products so one needs to ensure that the brand used is a reliable and reputable one.

The nuts and bolts

Before any decisions are made with regard to perimeter security requirements, a detailed risk assessment needs to be performed. This will be contingent upon a site survey and the goals of the client. Determining factors include budget and analysis and an understanding of the movement and volume of people through the premises.

Hartzenberg breaks it down into eight steps. Firstly, a thorough reference check should be performed on the service provider. Secondly the perimeter needs to be broken down into zones based on both the length and risk profile, with higher risk areas being shorter in length.

One needs to determine whether there is risk of burrowing and then to consider an anti-burrowing solution. One also needs to ensure that the height of the fence is suited to the determined risks and that the spacing of both the intermediate supports (1.5-3.0 m) and the wiring spacing (75-100 mm) is such that any breach is severely hampered.

The right materials need to be selected relative to the conditions, for example, galvanised versus stainless steel. The goal should be to use the best IP energisers available that can be interrogated and managed remotely. The final step is reaching agreement with the installer regarding a maintenance plan, which holds the installer accountable for defective installation or materials.

For more information contact:

C3 Shared Services, +27 (11) 312 2041, marketing@c3ss.com, www.c3ss.com

Elf Rentals, +27 (0)41 368 3701, www.elfrentals.co.za

TeleEye (South Africa), +27 (0)11 557 9200, www.TeleEye.com

Thermal perimeters

Flir’s Theresa Turner discusses the applicability of thermal cameras to perimeter solutions.

What are the latest trends in perimeter security?

People are generally looking for the best technical solution at an affordable price. Thermal cameras offer a solution that will create alarms and produce images in complete darkness and in most weather conditions. Why not detect intruders, create an alarm and have visual verification?

What can be added to the traditional fence to improve security?

Mechanical protection of a perimeter is a solution but can be defeated relatively easily. The use of thermal cameras in combination with analytics will provide an alarm when an intruder compromises a perimeter and will also provide visual verification. The benefits are that you need fewer thermal cameras than visual CCTV cameras, there is no light pollution, the energy consumption is less as is the installation cost.

What processes should a customer go through when designing a perimeter solution?

A consideration should be given to the level of security needed. If you have valuable assets and you need to generate alarms when a perimeter in compromised then thermal cameras with analytics if a good solution. The next stage is to plan the layout of the cameras this can be done using the FLIR site planning tool http://content.flircs.com/sitebuilder. Also, due

consideration should be given to a suitable analytics supplier.

How does one incorporate the increased cost of thermals into a perimeter solution?

The cost of thermal cameras has reduced considerably in recent years. Their use can be easily justified as thermal cameras cover larger areas than CCTV cameras, some products will detect a man at 20 km. As fewer cameras are used the installation cost is less. In addition, the power consumption is very low for thermal cameras as there is no illumination needed.

FLIR sell a complete range of thermal cameras, in addition there is a full selection of visible CCTV cameras and recorders.

For more information contact FLIR Systems, +44 (0)1622 814742, theresa.turner@flir.uk.com, www.flir.com


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

HID addresses identification challenges at ID4Africa
August 2019 , News, Access Control & Identity Management, Government and Parastatal (Industry)
Being able to verify people’s identities is critical for a nation’s growth and prosperity and yet HID says nearly half of all African citizens can’t prove who they are to vote, travel freely and receive government benefits and services.

Read more...
Came acquires Turkish company Özak
August 2019, CAME BPT South Africa , News, Access Control & Identity Management
Came broadens its market horizons and signals growth and consolidation in the Middle East.

Read more...
Securing Savannah Hills Estate
August 2019, Rhyco Risk Projects , CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
Savannah Hills Estate in Midrand planned a security upgrade which was awarded to Rhyco Risk Projects. The project started in March 2019 and was completed in May 2019.

Read more...
The benefits of electronic visitor management
August 2019, Powell Tronics , Access Control & Identity Management, Residential Estate (Industry)
Access control is a critical aspect of estate security as it represents the controls put in place to restrict entry (and possibly exit) along the outer boundary of the location.

Read more...
Addressing risks by means of access control layout and design
August 2019 , Access Control & Identity Management, Security Services & Risk Management
In order to develop a suitable, practical and appropriate security system for any organisation, it is essential to first develop a master security and life safety plan strategy.

Read more...
Secure hands-free access
August 2019, Suprema , Access Control & Identity Management, Residential Estate (Industry)
Suprema’s facial biometric terminals bring no-touch access into secure residential estates, high-rise apartments and luxury homes providing fast, easy and intuitive user authentication with the added benefit of hygiene.

Read more...
MorphoAccess Sigma Extreme
August 2019, IDEMIA , Products, Access Control & Identity Management
MorphoAccess Sigma Extreme from IDEMIA is a touchscreen device with multiple recognition device interfaces (NFC chip reader, PIN and BioPIN codes, contactless card readers).

Read more...
Outdoor access terminals
August 2019, Suprema , Access Control & Identity Management, Residential Estate (Industry), Products
Rugged, dust- and weather-proof access control solutions that provide exceptional durability in extreme conditions is a strong requirement for many residential estates.

Read more...
MorphoWave Compact
August 2019, IDEMIA , Products, Access Control & Identity Management
The MorphoWave Compact captures and matches four fingerprints on either the right or left hand in any direction. It is robust to environmental factors such as extreme light or dust.

Read more...
MorphoAccess Sigma Lite
August 2019, IDEMIA , Products, Access Control & Identity Management
IDEMIA’s MorphoAccess Sigma Lite and Lite + are fingerprint access control terminals, offering time and attendance in and out function keys.

Read more...