«We’ve come a long way since the days of castles and moats with squawking About the Author: Bob Gruber holds a geese for alarms and lifted ...»
Perimeter Security: Deter, Detect, Delay, and Deny
by Robert Gruber, PSP
Master Halco Security Solutions Group
We’ve come a long way since the days of castles and moats with squawking
About the Author:
Bob Gruber holds a
geese for alarms and lifted drawbridges to delay access while pouring boiling Master of Science degree
in Information and
oil and shooting arrows as a lethal response to invaders. However, the
Systems Management. He is a former United States principles of perimeter security are much the same even though technology has Marine and has been a Naval Intelligence Specialist and a CIA certainly improved! Perimeter security still requires a total response that deters, officer. He currently works as Technology Manager detects, delays, and denies intruders access to your vital holdings. for the Security Solutions Group of Master Halco, North America’s leading manufacturer and wholesale distributor of Deter perimeter security and fencing. Bob is a board A few generations ago, perimeter security would have been concerned only with certified Physical Security Professional (PSP) and serves on the academic “deterrence.” Protecting the perimeter was somewhat of an afterthought. Once
trespasser will attack the other location instead of yours.
High-security fences are still designed with deterrence in mind. Attractive decorative fences can be built to withstand a 15,000-pound vehicle traveling at 50 miles per hour,
can also electrify a fence, bury the bottom of it, and put stacks of razor tape on top and along both sides. The professional, however, will get to the other side. With the world’s situation becoming more and more dangerous in matters of terrorist activity, it has become very important to be able to detect, delay and respond at the perimeter in addition to deterring.
Detect Detection is necessary because a person can climb over a fence. Sandia National Laboratories’ testing has determined that a highly skilled trespasser could get to the other side of a well-designed fence in about 4 seconds. In a high security application, it is accepted that a trespasser will get through a fence within 4 to 40 seconds, so it becomes very important to convey information that someone has gotten over the fence, or is presently attempting to do so. This is where intrusion detection enters the picture.
Factors such as the “probability of detection” and “time to detect” become important, and satisfying these factors will determine which type of intrusion detection equipment to choose.
“For many facilities, perimeter security is one of the most important applications to install. It needs to be detailed, with a variety of methods that double-check for intrusion, and must be maintained to be effective,” says Roy Bordes, President of the Bordes Group and ASIS Foundation Funds Development Chairman.
Jimmy Cagney movies? Jimmy would be breaking out of prison, with sirens blaring and searchlights illuminated to find him. Lights would shine all over the place, up, down, side to side, but Jimmy would always manage to duck under the light. Well, now it would be somewhat more difficult. With a fiber optic stretched along the fence, an anomaly such as a bend or twist in the optic, no matter how slight, would show a slight variation in the color of the light (different wavelengths contained in white light reflect at different angles). An optical time domain reflectometer (a type of radar for light) attached to the fiber optic would locate the spot, within about a meter, where the twist or bend took place, and a searchlight could be instantly aimed at that point. If Jimmy were running around the yard, a microwave or infrared detector would pick him up. Sorry Jimmy – we gotcha now! The military can actually do something similar, but with the use of machine guns rather than searchlights!
Besides fiber optics, many other things can be used at the perimeter for detection. There is the old standby, taut wire, which is still one of the most efficient systems. Wire is stretched tight, like a guitar string, typically at the offsets atop the fence. These tight wires are attached at the end(s) to sensors. Other systems that can be attached directly to the fence include electro-magnetic devices, which can be capacitive or inductive in nature or even magnetic. This type of system works very well to protect a warehouse and surrounding yard. Many airport fences protecting runways have this type of system installed. Magnetic detectors will usually pick up humans carrying metal—even if it’s only fillings in their teeth—and will ignore animals.
that experiences frequent storms. How can a vibration detection device on the fence work well when we don’t want to be presented with nuisance alarms every time the wind blows? It is possible to install a meteorological system at the fence that will constantly measure wind speed, temperature, humidity, etc., and compensate for changes in the environment. Some systems have this “weather station” built in. Only a rapid change in the environment would cause an alarm (in some cases, we may want to know when a sudden windstorm kicks up).
Other methods of detecting a trespasser can actually take place before someone touches the fence. Cable, either fiber optic or electromagnetic, can be buried in the ground in front of or behind a fence. In the case of fiber optics, pressure on top of the fiber would be generated down into the ground, and will cause the fiber to bend slightly, changing the color of the light that continues on from that point. Electromagnetically “ported coax cable” can also be used. This cable is referred to as “leaky co-ax,” because it is a system of coaxial cable that has holes in the ground sheath around the conductor, thereby allowing some radio frequency energy to “leak” out. This leaky RF will form a balloon-like pattern above the ground, height determined by depth/distance of cables and nature of the ground. If a body penetrates this balloon-like cloud, the imbalance in the energy will be transmitted to a receiver via the cable system.
using microwave beams, light beams, or heat seeking infrared detectors. The light beams can be invisible, and some types of beams can even be digital in nature, encrypted to turn on and off at very rapid and irregular intervals, thereby precluding someone “spoofing” the system with their own light source aimed from the transmitter point over to the receiver. Many detectors use dual technology, a combination of RF and light, or RF and microwave, to prevent false alarms. So, now we have “deter and detect.” The next step is to delay, and ideally we want our delay to equal at least our response time to deny a trespasser entry to our critical infrastructure.
Delay / Respond The look and nature of our perimeter security is the deterrent. The technology we have in front of our perimeter and connected to the perimeter will handle the detection. The delay is a function of how long we need to respond. The response can be instant – turning on the lights, sounding a siren, or aiming a video camera along the perimeter to the point of intrusion. A longer response time is required if personnel must rush to the area. In that case, we may have to design layers of perimeter security such as an outer fence with barbed wire offsets, then bundles of coiled razor wire, and inner fencing.
Typically, a designer will aim for a 40 second delay at the perimeter by using a series of devices.
Yet, we can have the best detection system available in the world, but if we can’t communicate the information that our fence has been breached in a timely manner, the
“talk” to each other, or at least communicate via a software application package of some sort. In the past, every system had its own output that would be wired to a monitoring location. These monitoring locations rapidly became crowded with tens or even hundreds of devices that each had their own operating system and alarm mechanism. The poor security guard had to have an eye on 30 different systems at the same time, and worse yet, had to know how to operate each one using the correct proprietary communication codes.
Now, thanks to modern telecommunications, all the devices discussed here can be combined into one system via the use of TCP/IP, Telecommunications Protocol/Internet Protocol. We can give each sensor in our intrusion detection system, such as the device that picks up vibration at the fence, its own IP address.. This allows two-way communication to the sensor via our computer network, whether it is local (LAN) or remote via the Internet (WAN). This means that the operator can make adjustments to the sensor from the control location, or can be notified about something from the sensor. All this capability can be integrated into one operating system. That system can perform all necessary security functions for the enterprise – functions such as creating badges, keeping employee files, saving monitoring logs of employees coming and going, viewing closed circuit TV, and of course, running the intrusion detection system.
With this integrated capability, a fence breaching will instantly show up on a computer screen at the monitoring station, and a response can immediately take place. Since we
Palm or Blackberry! The response can take the form of activating a camera and allowing the security guard to control it with a pan, tilt, and zoom control (PTZ), or turning on floodlights, sending out a vehicle with guards, activating a siren, or whatever is the appropriate response for a particular facility.
Perimeter security measures are now so sophisticated, that we can set up an “intelligent” video system which will look for certain “situations” needing a response.
We can program the intelligent video to alarm if someone is walking in the wrong direction, or if someone starts climbing the fence, or if someone drops a bag and it remains stationary for a certain period of time. Delaying an intruder easy access to the perimeter of our facility long enough to deny him access to our critical infrastructure is the key.
Deny Finally, you ask, “why is the perimeter so important, anyway? If we have good security at the door to the building, we can keep people out. All we need at the perimeter is a boundary line and a gate.” The answer is that people with intention to harm only have to get next to the building to cause severe damage. Remember the Oklahoma City bombing. The perpetrator(s) never even had to leave the curb.
“The importance of these concepts, deter, detect, delay and deny are clearly demonstrated through recently mandated changes in the physical security of the US’ commercial nuclear industry,” says Haim Perry, VP of Technology for Safeguards Technology, Inc. “Immediately following the attacks of September 11, 2001, the NRC (US Nuclear Regulatory Commission) issued a series of Advisories to its major licensed facilities.
Perimeter Security and the Four D's 7 These statements advised licensees to go to the highest level of security, and to further augment their security via increased patrols, additional security forces and capabilities, installation of extra physical barriers, vehicle checks at greater stand-off distances, enhanced coordination with law enforcement and military authorities, and more restrictive site access controls. As the result of implementing the concepts of deter, detect, delay and deny, the security of the nuclear industry has been significantly enhanced.” Even if physical damage to a structure or facility is not an intruder’s intent, vital data must also be protected and trespassers denied access to critical information. When you add a total system solution of perimeter security to any building or facility already secured by modern access controls, you create a modern “moat” that protects and secures your infrastructure, denying and controlling admittance to your grounds on your terms.
--------------------------------End----------------------Quoted People Contact Info:
Haim Perry, VP of Technology Safeguards Technology, Inc.
75 Atlantic Street Hackensack, NJ 07601 Tel: 201-488-1022 ext. 236 Fax: 201-488-1244 Safeguards Technology, Inc. has been designing, manufacturing and installing smart perimeter control and intrusion detection systems since 1982. Today, Safeguards has grown to be the key supplier to many different markets and industries throughout the world. Our company headquarters and manufacturing facility is located in Hackensack, New Jersey, only a short distance from New York City. Regional sales offices are located in California and South Carolina.
(Master Halco and Safeguards Technology, Inc. do have a business partnership.) Roy Bordes, President and CEO (also, ASIS Foundation Fund Development Chairman) The Bordes Group, Inc.
Professional Security Design Consultants 1421 S. Orange Blossom Trail Orlando, FL 32805 Telephone (407) 851-8734 Fax (407) 851-1215 e-mail: email@example.com The Bordes Group, Inc. was formed to provide consulting services for clients requiring advanced technology integrated system designs. These designs are usually directly related to technologies applicable to intrusion detection, access controls, closed circuit television surveillance, and loss prevention systems.