Perimeter security options

Residential Estate Security Handbook 2016 - Vol 2 Perimeter Security, Alarms & Intruder Detection, Integrated Solutions, Residential Estate (Industry)

Securing the perimeter of an estate, whether a luxury estate or a small complex, is the first and primary task if one wants to live in a seemingly secure environment. There are those who would say the gate or gates are the primary positions to secure, but when you think of it, a gate is simply a more complex part of the perimeter.

We mention some options to secure the gate via access control and visitor management in this issue of the Residential Estate Security Handbook, as we did in volume I (released 6 months ago). However, despite the importance of securing the gate, the perimeter of an estate is a long area that offers numerous opportunities for the criminally inclined if not secured properly.

In this issue we touch on the benefits of using thermal cameras on the perimeter, but even with these devices, one still needs more, a fence or wall, preferably electrified and so forth. These solutions, combined with surveillance cameras, work in large estates, but they are not always welcome in estates where there are homes on the perimeter. Who wants a camera constantly taking a video of your back yard? In these cases, a different perimeter solution is required, although it is always advisable to have some form of visual security.

So how does an estate manager go about addressing perimeter security?

No matter what solutions you choose for the perimeter, Cliff Rose of Modular Communications says a perimeter defence must have the following attributes:

• Detect.

• Deter.

• Delay.

And where a perimeter is long it needs technology to verify the detected intrusion.

“In order to be an effective perimeter detection system, and considering the privacy of units bordering the perimeter, the detection system needs to be able to determine the section of perimeter violated per unit bordering the perimeter,” says Rose. “Far too often a perimeter alarm is received and it is impossible to physically check the perimeter as it is not accessible to onsite security – if you have such. In any event, residents are not always keen to open their yard bordering the perimeter at all hours of the night to security as this in itself is a risk.

“So when considering perimeter security from a technology point of view, the detection system needs to be able to determine the violated perimeter on a ‘per unit’ or per home basis bordering the perimeter.”

He adds that if this is not possible, it should be possible to verify such an alarm using a visual method like surveillance cameras. The best solution here is thermal imaging cameras which can cover longer distances than conventional day/night cameras. They also do not need security lighting and reduce the invasion of privacy problem associated with conventional CCTV cameras.

Matie Strydom from Odet Systems Africa, agrees, that in terms of detection systems, the choice of technology should support the classical approach of detection, deterrence and he adds 'documentation'.

“The fourth D, ‘denial’, is better addressed by the type of physical perimeter erected. The detection technology should also be robust and reliable in all applications and under all metrological conditions. As high-end detection systems are expensive, maximum integration functionality to other security systems such as CCTV and access control, to name a few, should be supported on both the physical and software level. He says this will offer redundancy and can afford the possibility of a ‘double knock’ system, further enhancing dependability.

“As we live in a connected world, such a detection system must support IP as a protocol to enhance the functionality of a system, enabling hierarchical alarm/event reporting to whoever might have interest in it. Needless to say, a perimeter intrusion detection system (PIDS), should have a high probability of detection and a low nuisance alarm rate.”

Visual verification

The common view is that even if you know the exact location of an incident, you shouldn’t be sending guards to an incident without knowing what they will find. This is where visual verification comes into play, giving security personnel knowledge of whom and what they face at the point of the breach.

Rose says effective security is not really possible without some form of visual verification. “Due to the very nature of many estates, high boundary walls intended to give privacy are the very feature that compound your security risk and also makes it difficult to verify by normal human intervention. A non-invasive solution needs to be applied to solving this problem of verification and we prefer the solution of thermal imaging cameras.”

Strydom is of the view that although it is possible to have an alarm reporting system without visual confirmation, the reliability and functionality PIDS is enhanced by the inclusion of a surveillance – optical or thermal – to provide the most reliable means of detection. In addition, an additional system can act as a backup should the primary system fail.

PIDS options

Odet’s PIDS uses a multimode fibre optic cable as a medium to detect any seismic events in the ground as well as on a structure like a fence. It is sensitive to any interaction to the structure and ground. All events have a unique 'fingerprint' that can be classified into a software library that the system can use to differentiate between events detected.

Events can be classified as an alarm by the operator, enabling the system to fine-tune its alarms on a site-specific basis. By following this approach, the system already has a high degree of immunity to nuisance alarms caused by stormy weather etc., and only improves with time as it learns the events at the site it is deployed at.

“As far as cost effectiveness is concerned, we believe that the Odet system, being locally manufactured, offers a price advantage compared to overseas systems,” Strydom adds. “A point to remember is also the fact that with the Odet PIDS, the fibre optic cable and power reticulation infrastructure can be shared by other systems such as CCTV, access control, telemetry, lights, audio, contact I/O etc., all controlled by Odet’s software. This makes for a very cost effective implementation if viewed in a systems context.”

Rose has another take on the subject. He says fibre detection systems are not cost effective when smaller zones are required. Added to this, if the fibre is damaged, normally deliberately, a specialist person to re-splice the cable is needed. “Our experience from users of this type of detection complain due to the long lead time to repair a fibre cable that has been damaged deliberately by potential intruders. Although fibre solutions can be reliable, the inability to easily get the cable repaired is the downfall of this solution. The sensor cable detection system employed by AcoustAlert can easily be repaired by non-technical people with no more than a screwdriver, side cutter and a gel joint kit.”

AcoustAlert is a perimeter detection solution based on the use of a microphonic sensor cable, mounted onto the perimeter structure. It detects intruders climbing, cutting, breaking through or crawling under the fence or perimeter. It sends an alarm which is generated during the disturbance to the guards control room or an offsite monitoring control room.

It can be mounted onto a fence to detect fence disturbance, underground to detect under digging or on a wall top to detect wall climbing. It is easy to install, maintain and integrate into other alarm and switching systems. It is a cost-effective first line of defence for perimeters.

Fence detections solutions like the AcoustAlert can be setup to reject unwanted noises in a specific area, which can be filtered out, while incidents like knocks and interference on the perimeter can trigger an alarm condition. Each AcoustAlert field processor has two sensor zones, each zone covering a maximum distance up to 300 metres. Where protection of a large premises is required, multiple field processors can be used and networked together.

Back to basics

With all the talk about technology, one can easily forget that any perimeter defence solution can be sufficient if your planning is sufficient. Within the concept of planning we include the risk assessment and mitigation strategy that must occur before any decisions or purchases are made.

Strydom says Odet subscribes to the following 'A, B, C, D' guidelines, with acknowledgement to the Chain Link Fence Manufacturing Institute in the U.S.A.:

• Aids to security. Fencing should assist in the use of other security equipment, such as the use of intrusion detectors, access controls, cameras, etc. Fences can be employed as aids to protection in an exterior mode or an internal protected property, as a point protection, and for general protection as required.

• Barriers for security. These can be buildings, fences, walls, temporary checkpoints, etc.

• Controls support the physical security fences and barriers, such as an access control system tied into vehicle gates and pedestrian portals, various level identification badges and temporary badges, security escorts and internal procedures.

• Deterrents such as a fence, guards, lighting, signage, and checkpoint control procedures are a few of the deterrents that ensure intruders will consider it difficult to successfully gain access.

“As long as the above is considered, any sturdy solution should suffice,” Strydom concludes.

Rose’s take on the matter is, “In all cases you pay for what you get and in all cases the developer of an estate will install just enough visible security to assist in marketing his development as secure or as a security estate.”

He says this is commonly the route of the problem with estate security:

• The developer applies as much visual security as needed for marketing purposes.

• Not much attention is paid to technology.

• The concept of layering is not considered.

• Normal day/night cameras are used without lighting for night time visuals.

• And the prospective homeowner buys on what he sees on face value and does not even understand security.

To overcome this and end up with an effective perimeter security solution, Rose advises the following:

• Detection of an intruder split into zones determined by the separation of perimeter properties.

• Second layer of detection using video analytics.

• Verification of alarms by thermal camera, negating the need for additional lighting at night and retaining residents’ privacy.

• Deterrent in the form of switching on the electric fence when an alarm occurs.

• Delaying the intrusion by considering the construction of the perimeter wall as to make it difficult to climb.

• Wall top detection also as a layer of security.

• Offsite monitoring and responding to alarms in a controlled environment.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New alarm solutions
Issue 2 2020, Hikvision South Africa , Perimeter Security, Alarms & Intruder Detection
Hikvision has created a broad portfolio of alarm solutions that are sophisticated, automated, and fit for purpose.

Read more...
The reality of load shedding
Issue 2 2020, Technews Publishing , News
It may be that I am a bit slow on the pick-up, but recent events and conversations have driven the reality of what rolling blackouts (called load shedding by Eskom to make it sound less devastating) are ...

Read more...
Cybersecurity in the physical security world
Issue 2 2020, Technews Publishing , Calendar of Events
Cybersecurity in the physical security world    May 2020    Johannesburg    Hosted by Hi-Tech Security Solutions    More details to come.   

Read more...
Technology solutions to enhance retail security and optimise profit
Issue 2 2020, Technews Publishing , Calendar of Events
Technology solutions to enhance retail security and optimise profit    16 July 2020    Johannesburg    Hosted by Hi-Tech Security Solutions    More details to come.   

Read more...
Residential Estate Security Conference Johannesburg
Issue 2 2020, Technews Publishing , Calendar of Events
Residential Estate Security Conference Johannesburg    20 August 2020    Johannesburg    Hosted by Hi-Tech Security Solutions    More details to come.   

Read more...
Ongoing profile and specification development in 2020
Issue 2 2020, Technews Publishing , News
Per Björkdahl says ONVIF has over 500 member companies and around 15 000 conformant products.

Read more...
Converged security plus operational benefits
Issue 2 2020, Technews Publishing, Hikvision South Africa, Axis Communications SA, Bosch Building Technologies , Healthcare (Industry)
Hi-Tech Security Solutions looks at how security can defend open and accessible healthcare organisations while assisting in daily operations?

Read more...
The importance of effective SLAs
Issue 2 2020, Technews Publishing, ISF SFP , Editor's Choice
A successful security installation that delivers over the long term requires ongoing maintenance and a reliable service provider.

Read more...
Fire safety critical in healthcare
Issue 2 2020, Spero Sensors & Instruments, Technews Publishing , Fire & Safety
Healthcare organisations have a lot on their collective plates and it can be easy to overlook security issues in favour of more pressing demands.

Read more...
IFSEC rescheduled to 8-10 September 2020 due to coronavirus fears
Issue 2 2020, Technews Publishing , News
IFSEC and co-located shows have been rescheduled to take place on 8–10 September 2020 at London ExCeL.

Read more...