Perimeter security options

October 2016 Perimeter Security, Alarms & Intruder Detection, Integrated Solutions, Residential Estate (Industry)

Securing the perimeter of an estate, whether a luxury estate or a small complex, is the first and primary task if one wants to live in a seemingly secure environment. There are those who would say the gate or gates are the primary positions to secure, but when you think of it, a gate is simply a more complex part of the perimeter.

We mention some options to secure the gate via access control and visitor management in this issue of the Residential Estate Security Handbook, as we did in volume I (released 6 months ago). However, despite the importance of securing the gate, the perimeter of an estate is a long area that offers numerous opportunities for the criminally inclined if not secured properly.

In this issue we touch on the benefits of using thermal cameras on the perimeter, but even with these devices, one still needs more, a fence or wall, preferably electrified and so forth. These solutions, combined with surveillance cameras, work in large estates, but they are not always welcome in estates where there are homes on the perimeter. Who wants a camera constantly taking a video of your back yard? In these cases, a different perimeter solution is required, although it is always advisable to have some form of visual security.

So how does an estate manager go about addressing perimeter security?

No matter what solutions you choose for the perimeter, Cliff Rose of Modular Communications says a perimeter defence must have the following attributes:

• Detect.

• Deter.

• Delay.

And where a perimeter is long it needs technology to verify the detected intrusion.

“In order to be an effective perimeter detection system, and considering the privacy of units bordering the perimeter, the detection system needs to be able to determine the section of perimeter violated per unit bordering the perimeter,” says Rose. “Far too often a perimeter alarm is received and it is impossible to physically check the perimeter as it is not accessible to onsite security – if you have such. In any event, residents are not always keen to open their yard bordering the perimeter at all hours of the night to security as this in itself is a risk.

“So when considering perimeter security from a technology point of view, the detection system needs to be able to determine the violated perimeter on a ‘per unit’ or per home basis bordering the perimeter.”

He adds that if this is not possible, it should be possible to verify such an alarm using a visual method like surveillance cameras. The best solution here is thermal imaging cameras which can cover longer distances than conventional day/night cameras. They also do not need security lighting and reduce the invasion of privacy problem associated with conventional CCTV cameras.

Matie Strydom from Odet Systems Africa, agrees, that in terms of detection systems, the choice of technology should support the classical approach of detection, deterrence and he adds 'documentation'.

“The fourth D, ‘denial’, is better addressed by the type of physical perimeter erected. The detection technology should also be robust and reliable in all applications and under all metrological conditions. As high-end detection systems are expensive, maximum integration functionality to other security systems such as CCTV and access control, to name a few, should be supported on both the physical and software level. He says this will offer redundancy and can afford the possibility of a ‘double knock’ system, further enhancing dependability.

“As we live in a connected world, such a detection system must support IP as a protocol to enhance the functionality of a system, enabling hierarchical alarm/event reporting to whoever might have interest in it. Needless to say, a perimeter intrusion detection system (PIDS), should have a high probability of detection and a low nuisance alarm rate.”

Visual verification

The common view is that even if you know the exact location of an incident, you shouldn’t be sending guards to an incident without knowing what they will find. This is where visual verification comes into play, giving security personnel knowledge of whom and what they face at the point of the breach.

Rose says effective security is not really possible without some form of visual verification. “Due to the very nature of many estates, high boundary walls intended to give privacy are the very feature that compound your security risk and also makes it difficult to verify by normal human intervention. A non-invasive solution needs to be applied to solving this problem of verification and we prefer the solution of thermal imaging cameras.”

Strydom is of the view that although it is possible to have an alarm reporting system without visual confirmation, the reliability and functionality PIDS is enhanced by the inclusion of a surveillance – optical or thermal – to provide the most reliable means of detection. In addition, an additional system can act as a backup should the primary system fail.

PIDS options

Odet’s PIDS uses a multimode fibre optic cable as a medium to detect any seismic events in the ground as well as on a structure like a fence. It is sensitive to any interaction to the structure and ground. All events have a unique 'fingerprint' that can be classified into a software library that the system can use to differentiate between events detected.

Events can be classified as an alarm by the operator, enabling the system to fine-tune its alarms on a site-specific basis. By following this approach, the system already has a high degree of immunity to nuisance alarms caused by stormy weather etc., and only improves with time as it learns the events at the site it is deployed at.

“As far as cost effectiveness is concerned, we believe that the Odet system, being locally manufactured, offers a price advantage compared to overseas systems,” Strydom adds. “A point to remember is also the fact that with the Odet PIDS, the fibre optic cable and power reticulation infrastructure can be shared by other systems such as CCTV, access control, telemetry, lights, audio, contact I/O etc., all controlled by Odet’s software. This makes for a very cost effective implementation if viewed in a systems context.”

Rose has another take on the subject. He says fibre detection systems are not cost effective when smaller zones are required. Added to this, if the fibre is damaged, normally deliberately, a specialist person to re-splice the cable is needed. “Our experience from users of this type of detection complain due to the long lead time to repair a fibre cable that has been damaged deliberately by potential intruders. Although fibre solutions can be reliable, the inability to easily get the cable repaired is the downfall of this solution. The sensor cable detection system employed by AcoustAlert can easily be repaired by non-technical people with no more than a screwdriver, side cutter and a gel joint kit.”

AcoustAlert is a perimeter detection solution based on the use of a microphonic sensor cable, mounted onto the perimeter structure. It detects intruders climbing, cutting, breaking through or crawling under the fence or perimeter. It sends an alarm which is generated during the disturbance to the guards control room or an offsite monitoring control room.

It can be mounted onto a fence to detect fence disturbance, underground to detect under digging or on a wall top to detect wall climbing. It is easy to install, maintain and integrate into other alarm and switching systems. It is a cost-effective first line of defence for perimeters.

Fence detections solutions like the AcoustAlert can be setup to reject unwanted noises in a specific area, which can be filtered out, while incidents like knocks and interference on the perimeter can trigger an alarm condition. Each AcoustAlert field processor has two sensor zones, each zone covering a maximum distance up to 300 metres. Where protection of a large premises is required, multiple field processors can be used and networked together.

Back to basics

With all the talk about technology, one can easily forget that any perimeter defence solution can be sufficient if your planning is sufficient. Within the concept of planning we include the risk assessment and mitigation strategy that must occur before any decisions or purchases are made.

Strydom says Odet subscribes to the following 'A, B, C, D' guidelines, with acknowledgement to the Chain Link Fence Manufacturing Institute in the U.S.A.:

• Aids to security. Fencing should assist in the use of other security equipment, such as the use of intrusion detectors, access controls, cameras, etc. Fences can be employed as aids to protection in an exterior mode or an internal protected property, as a point protection, and for general protection as required.

• Barriers for security. These can be buildings, fences, walls, temporary checkpoints, etc.

• Controls support the physical security fences and barriers, such as an access control system tied into vehicle gates and pedestrian portals, various level identification badges and temporary badges, security escorts and internal procedures.

• Deterrents such as a fence, guards, lighting, signage, and checkpoint control procedures are a few of the deterrents that ensure intruders will consider it difficult to successfully gain access.

“As long as the above is considered, any sturdy solution should suffice,” Strydom concludes.

Rose’s take on the matter is, “In all cases you pay for what you get and in all cases the developer of an estate will install just enough visible security to assist in marketing his development as secure or as a security estate.”

He says this is commonly the route of the problem with estate security:

• The developer applies as much visual security as needed for marketing purposes.

• Not much attention is paid to technology.

• The concept of layering is not considered.

• Normal day/night cameras are used without lighting for night time visuals.

• And the prospective homeowner buys on what he sees on face value and does not even understand security.

To overcome this and end up with an effective perimeter security solution, Rose advises the following:

• Detection of an intruder split into zones determined by the separation of perimeter properties.

• Second layer of detection using video analytics.

• Verification of alarms by thermal camera, negating the need for additional lighting at night and retaining residents’ privacy.

• Deterrent in the form of switching on the electric fence when an alarm occurs.

• Delaying the intrusion by considering the construction of the perimeter wall as to make it difficult to climb.

• Wall top detection also as a layer of security.

• Offsite monitoring and responding to alarms in a controlled environment.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

TAPA: The role of an effective treasury function in business risk management
June 2019, Technews Publishing , News
Neil Le Roux, the Founder of Diligent Advisors will speak at the TAPA SA (Transported Asset Protection Association) annual conference on 26 July 2019.

Read more...
iLegal 2019: Critical IT aspects of Augmented Surveillance
August 2019, Technews Publishing , News
iLegal is the surveillance industry’s premier one-day conference hosted jointly by Hi-Tech Security Solutions and Dr Craig Donald. iLegal 2019 will be held on 12 September 2019 at The Rosebank Crowne ...

Read more...
iLegal 2019: Putting a face on surveillance services
August 2019, Technews Publishing , News, Conferences & Events
iLegal 2019 will be held on 12 September 2019 at The Rosebank Crowne Plaza in Johannesburg. iLegal is the surveillance industry’s premier one-day conference hosted jointly by Hi-Tech Security Solutions and Dr Craig Donald.

Read more...
Residential Estate Security Conference 2019: Making AI work for you
August 2019, Technews Publishing , News, Conferences & Events
Gerhard Furter will deliver the keynote at the Residential Estate Security Conference 2019, providing a brief introduction into what AI really is and its application in estates.

Read more...
From the editor's desk: The difference between potential and skills
August 2019, Technews Publishing , News
This issue of Hi-Tech Security Solutions includes our annual Local Manufacturing feature and it’s great to know that local security manufacturers are still going strong, even if the general manufacturing ...

Read more...
A customised solution for backup power
August 2019, Specialised Battery Systems , News, Integrated Solutions
Specialised Battery Systems designed and implemented a bespoke solution for Stallion Security Electronics to deploy at almost any site.

Read more...
iLegal 2019: Enhancing and empowering your control rooms
July 2019, Technews Publishing , News, Conferences & Events
iLegal 2019 will be held on 12 September 2019 at The Rosebank Crowne Plaza in Johannesburg. iLegal is the surveillance industry’s premier one-day conference hosted jointly by Hi-Tech Security Solutions and Dr Craig Donald.

Read more...
Residential Estate Security Conference 2019: Managing for efficiency
July 2019, Technews Publishing , News, Conferences & Events
The Residential Estate Security Conference 2019 will be held on 20 August 2019, once again at the Indaba Hotel in Fourways, Johannesburg.

Read more...
Spending to save
August 2019, Technews Publishing , News
As residential estates and complexes grow like weeds across South Africa, often promoting themselves as more secure than a stand-alone house, many are finding that close proximity to a neighbour or a ...

Read more...
Augmented security with drones
August 2019, Drone Guards , Editor's Choice, Integrated Solutions
Drone Guards is moving into an untapped market of using drones to secure residential estates and other high-value assets such as mines, farms and commercial properties.

Read more...