FREE ELECTRONIC LIBRARY - Thesis, dissertations, books

«We’ve come a long way since the days of castles and moats with squawking About the Author: Bob Gruber holds a geese for alarms and lifted ...»

Perimeter Security: Deter, Detect, Delay, and Deny

by Robert Gruber, PSP

Master Halco Security Solutions Group

We’ve come a long way since the days of castles and moats with squawking

About the Author:

Bob Gruber holds a

geese for alarms and lifted drawbridges to delay access while pouring boiling Master of Science degree

in Information and


oil and shooting arrows as a lethal response to invaders. However, the

Systems Management. He is a former United States principles of perimeter security are much the same even though technology has Marine and has been a Naval Intelligence Specialist and a CIA certainly improved! Perimeter security still requires a total response that deters, officer. He currently works as Technology Manager detects, delays, and denies intruders access to your vital holdings. for the Security Solutions Group of Master Halco, North America’s leading manufacturer and wholesale distributor of Deter perimeter security and fencing. Bob is a board A few generations ago, perimeter security would have been concerned only with certified Physical Security Professional (PSP) and serves on the academic “deterrence.” Protecting the perimeter was somewhat of an afterthought. Once

–  –  –

trespasser will attack the other location instead of yours.

High-security fences are still designed with deterrence in mind. Attractive decorative fences can be built to withstand a 15,000-pound vehicle traveling at 50 miles per hour,

–  –  –

can also electrify a fence, bury the bottom of it, and put stacks of razor tape on top and along both sides. The professional, however, will get to the other side. With the world’s situation becoming more and more dangerous in matters of terrorist activity, it has become very important to be able to detect, delay and respond at the perimeter in addition to deterring.

Detect Detection is necessary because a person can climb over a fence. Sandia National Laboratories’ testing has determined that a highly skilled trespasser could get to the other side of a well-designed fence in about 4 seconds. In a high security application, it is accepted that a trespasser will get through a fence within 4 to 40 seconds, so it becomes very important to convey information that someone has gotten over the fence, or is presently attempting to do so. This is where intrusion detection enters the picture.

Factors such as the “probability of detection” and “time to detect” become important, and satisfying these factors will determine which type of intrusion detection equipment to choose.

“For many facilities, perimeter security is one of the most important applications to install. It needs to be detailed, with a variety of methods that double-check for intrusion, and must be maintained to be effective,” says Roy Bordes, President of the Bordes Group and ASIS Foundation Funds Development Chairman.

–  –  –

Jimmy Cagney movies? Jimmy would be breaking out of prison, with sirens blaring and searchlights illuminated to find him. Lights would shine all over the place, up, down, side to side, but Jimmy would always manage to duck under the light. Well, now it would be somewhat more difficult. With a fiber optic stretched along the fence, an anomaly such as a bend or twist in the optic, no matter how slight, would show a slight variation in the color of the light (different wavelengths contained in white light reflect at different angles). An optical time domain reflectometer (a type of radar for light) attached to the fiber optic would locate the spot, within about a meter, where the twist or bend took place, and a searchlight could be instantly aimed at that point. If Jimmy were running around the yard, a microwave or infrared detector would pick him up. Sorry Jimmy – we gotcha now! The military can actually do something similar, but with the use of machine guns rather than searchlights!

Besides fiber optics, many other things can be used at the perimeter for detection. There is the old standby, taut wire, which is still one of the most efficient systems. Wire is stretched tight, like a guitar string, typically at the offsets atop the fence. These tight wires are attached at the end(s) to sensors. Other systems that can be attached directly to the fence include electro-magnetic devices, which can be capacitive or inductive in nature or even magnetic. This type of system works very well to protect a warehouse and surrounding yard. Many airport fences protecting runways have this type of system installed. Magnetic detectors will usually pick up humans carrying metal—even if it’s only fillings in their teeth—and will ignore animals.

–  –  –

that experiences frequent storms. How can a vibration detection device on the fence work well when we don’t want to be presented with nuisance alarms every time the wind blows? It is possible to install a meteorological system at the fence that will constantly measure wind speed, temperature, humidity, etc., and compensate for changes in the environment. Some systems have this “weather station” built in. Only a rapid change in the environment would cause an alarm (in some cases, we may want to know when a sudden windstorm kicks up).

Other methods of detecting a trespasser can actually take place before someone touches the fence. Cable, either fiber optic or electromagnetic, can be buried in the ground in front of or behind a fence. In the case of fiber optics, pressure on top of the fiber would be generated down into the ground, and will cause the fiber to bend slightly, changing the color of the light that continues on from that point. Electromagnetically “ported coax cable” can also be used. This cable is referred to as “leaky co-ax,” because it is a system of coaxial cable that has holes in the ground sheath around the conductor, thereby allowing some radio frequency energy to “leak” out. This leaky RF will form a balloon-like pattern above the ground, height determined by depth/distance of cables and nature of the ground. If a body penetrates this balloon-like cloud, the imbalance in the energy will be transmitted to a receiver via the cable system.

–  –  –

using microwave beams, light beams, or heat seeking infrared detectors. The light beams can be invisible, and some types of beams can even be digital in nature, encrypted to turn on and off at very rapid and irregular intervals, thereby precluding someone “spoofing” the system with their own light source aimed from the transmitter point over to the receiver. Many detectors use dual technology, a combination of RF and light, or RF and microwave, to prevent false alarms. So, now we have “deter and detect.” The next step is to delay, and ideally we want our delay to equal at least our response time to deny a trespasser entry to our critical infrastructure.

Delay / Respond The look and nature of our perimeter security is the deterrent. The technology we have in front of our perimeter and connected to the perimeter will handle the detection. The delay is a function of how long we need to respond. The response can be instant – turning on the lights, sounding a siren, or aiming a video camera along the perimeter to the point of intrusion. A longer response time is required if personnel must rush to the area. In that case, we may have to design layers of perimeter security such as an outer fence with barbed wire offsets, then bundles of coiled razor wire, and inner fencing.

Typically, a designer will aim for a 40 second delay at the perimeter by using a series of devices.

Yet, we can have the best detection system available in the world, but if we can’t communicate the information that our fence has been breached in a timely manner, the

–  –  –

“talk” to each other, or at least communicate via a software application package of some sort. In the past, every system had its own output that would be wired to a monitoring location. These monitoring locations rapidly became crowded with tens or even hundreds of devices that each had their own operating system and alarm mechanism. The poor security guard had to have an eye on 30 different systems at the same time, and worse yet, had to know how to operate each one using the correct proprietary communication codes.

Now, thanks to modern telecommunications, all the devices discussed here can be combined into one system via the use of TCP/IP, Telecommunications Protocol/Internet Protocol. We can give each sensor in our intrusion detection system, such as the device that picks up vibration at the fence, its own IP address.. This allows two-way communication to the sensor via our computer network, whether it is local (LAN) or remote via the Internet (WAN). This means that the operator can make adjustments to the sensor from the control location, or can be notified about something from the sensor. All this capability can be integrated into one operating system. That system can perform all necessary security functions for the enterprise – functions such as creating badges, keeping employee files, saving monitoring logs of employees coming and going, viewing closed circuit TV, and of course, running the intrusion detection system.

With this integrated capability, a fence breaching will instantly show up on a computer screen at the monitoring station, and a response can immediately take place. Since we

–  –  –

Palm or Blackberry! The response can take the form of activating a camera and allowing the security guard to control it with a pan, tilt, and zoom control (PTZ), or turning on floodlights, sending out a vehicle with guards, activating a siren, or whatever is the appropriate response for a particular facility.

Perimeter security measures are now so sophisticated, that we can set up an “intelligent” video system which will look for certain “situations” needing a response.

We can program the intelligent video to alarm if someone is walking in the wrong direction, or if someone starts climbing the fence, or if someone drops a bag and it remains stationary for a certain period of time. Delaying an intruder easy access to the perimeter of our facility long enough to deny him access to our critical infrastructure is the key.

Deny Finally, you ask, “why is the perimeter so important, anyway? If we have good security at the door to the building, we can keep people out. All we need at the perimeter is a boundary line and a gate.” The answer is that people with intention to harm only have to get next to the building to cause severe damage. Remember the Oklahoma City bombing. The perpetrator(s) never even had to leave the curb.

“The importance of these concepts, deter, detect, delay and deny are clearly demonstrated through recently mandated changes in the physical security of the US’ commercial nuclear industry,” says Haim Perry, VP of Technology for Safeguards Technology, Inc. “Immediately following the attacks of September 11, 2001, the NRC (US Nuclear Regulatory Commission) issued a series of Advisories to its major licensed facilities.

Perimeter Security and the Four D's 7 These statements advised licensees to go to the highest level of security, and to further augment their security via increased patrols, additional security forces and capabilities, installation of extra physical barriers, vehicle checks at greater stand-off distances, enhanced coordination with law enforcement and military authorities, and more restrictive site access controls. As the result of implementing the concepts of deter, detect, delay and deny, the security of the nuclear industry has been significantly enhanced.” Even if physical damage to a structure or facility is not an intruder’s intent, vital data must also be protected and trespassers denied access to critical information. When you add a total system solution of perimeter security to any building or facility already secured by modern access controls, you create a modern “moat” that protects and secures your infrastructure, denying and controlling admittance to your grounds on your terms.

--------------------------------End----------------------Quoted People Contact Info:

Haim Perry, VP of Technology Safeguards Technology, Inc.

75 Atlantic Street Hackensack, NJ 07601 Tel: 201-488-1022 ext. 236 Fax: 201-488-1244 Safeguards Technology, Inc. has been designing, manufacturing and installing smart perimeter control and intrusion detection systems since 1982. Today, Safeguards has grown to be the key supplier to many different markets and industries throughout the world. Our company headquarters and manufacturing facility is located in Hackensack, New Jersey, only a short distance from New York City. Regional sales offices are located in California and South Carolina.

(Master Halco and Safeguards Technology, Inc. do have a business partnership.) Roy Bordes, President and CEO (also, ASIS Foundation Fund Development Chairman) The Bordes Group, Inc.

Professional Security Design Consultants 1421 S. Orange Blossom Trail Orlando, FL 32805 Telephone (407) 851-8734 Fax (407) 851-1215 e-mail: contact@bordesgroup.com The Bordes Group, Inc. was formed to provide consulting services for clients requiring advanced technology integrated system designs. These designs are usually directly related to technologies applicable to intrusion detection, access controls, closed circuit television surveillance, and loss prevention systems.

–  –  –

Similar works:

«Camping in Croatia Thanks to modern, well-equipped and attractive camping sites, which are usually located very close to the sea with their own beach, Croatia was last year ranked at the top of the European camping list, with a record 15.1 million overnight stays, which is seven percent more than in 2010. As well as by capacity, Croatia is also in the European top by the prices of camping. According to data presented at the Fifth Congress of Croatian Camping, most overnight stays (8.1 million)...»

«Electric cars have been marketed without much success since before the turn of the century. In recent years, concern over air pollution caused by the internal combustion engine and the rising cost of gasoline have revived interest in electric cars. CU therefore decided to test the only two electric cars being sold in any volume in this country: the CitiCar SV-48 and the Elcar 2000. We found major safety and operating problems. The CitiCar, made by Sebring-Vanguard, Inc., of Sebring, Fla., cost...»

«AFR 300 Heritage and Culture in Jamaica: A Wintersession Experience January 4-24, 2013 JOURNAL EXCERPTS Table of Contents I First Impressions 2 II Orientation 3 III Port Royal 4 IV Church 5 V Lectures and Presentations 6 Hutton, Witter, Dunn, Imani, Hutchinson, Spence, Sterling VI The Moore Town Maroons and Colonel Sterling 20 VII Excursions and Sightseeing 22 Port Royal, Marcus Garvey Museum, Bob Marley Museum, Ocho Rios and Dunn’s River Falls VIII Cultural Activities 26 ASHE, A’Ziko and...»

«*Las TIC en los países en vías de desarrollo de América Latina: ¿Una mayor competencia de proveedores de servicios de telecomunicaciones influye en una disminución de la Brecha Digital? *ICT in developing countries of Latin America: Any increased competition from telecommunications service providers influences decrease the Digital Divide? Emilio Espinoza Alvarado Máster (c) Iberoamericano en Cooperación Internacional y Desarrollo, Universidad de Cantabria escalibur44@hotmail.com Resumen...»

«BRANDING IN CHINA: GLOBAL PRODUCT STRATEGY ALTERNATIVES1 Ilan Alon Rollins College Romie F. Littrell Auckland University of Technology Allan K.K. Chan Hong Kong Baptist University This manuscript has benefited from the comments provided by Li Wei, Robert Moore, Wenxian Zhang, Xiaoqi Yu, Wenni Xiong, Mengdi Yao, Rich Lee BRANDING IN CHINA: GLOBAL PRODUCT STRATEGY ALTERNATIVES ABSTRACT This article reviews and discusses issues in translation of international brand names to Chinese, and provides a...»

«Linguistic “Misunderstandings,” Social Spaces, and the Restriction of Latin American Immigrants in Atlanta Nicholas Limerick University of Pennsylvania In the U.S. in general, and Atlanta, Georgia, in particular, changing demographic patterns have led to increased regulation of Latin American immigrant groups. In part through these changes, the Spanish language has become a focal point for enforcing spatial boundaries. In Atlanta, the neighborhood of Buford Highway is commonly acknowledged...»

«Feature Factory: A Collaborative, Crowd-Sourced Machine Learning System by Alex Christopher Wang Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Masters of Science in Computer Science and Engineering at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2015 ○ Massachusetts Institute of Technology 2015. All rights reserved. c Author..........................................»

«[FOUR FUTURE SCENARIOS FOR HIGHER EDUCATION What plays out in the future depends on decisions taken today, which can critically narrow the room for manœuvre over time. Hence the importance of factoring the long term into decision-making in higher education. This paper presents four scenarios for higher education systems developed by the OECD Secretariat as part of its ongoing project on the future of higher education. The University Futures project is designed to inform and facilitate...»

«JMLR: Workshop and Conference Proceedings 21:34–48, 2012 The 11th ICGI Bootstrapping and Learning PDFA in Data Streams B. Balle bballe@lsi.upc.edu J. Castro castro@lsi.upc.edu R. Gavald`a gavalda@lsi.upc.edu LARCA Research Group, LSI Department, Universitat Polit`cnica de Catalunya (Barcelona) e Editors: Jeffrey Heinz, Colin de la Higuera, and Tim Oates Abstract Markovian models with hidden state are widely-used formalisms for modeling sequential phenomena. Learnability of these models has...»

«Glossary of Customs Terms and Abbreviations Training Department The objective of this document is to provide officers and the trading public with access to a body of terms used by Customs Departments, the world over, and an understanding of the said terms. This work is far from being an exhaustive compendium of such terms. Thus it is a document that is still in its evolutionary process. St. Kitts and Nevis Customs and Excise Department Box 1, Bird Rock, Basseterre, St. Kitts and Nevis, KN265 +1...»

«-1ИНТЕГРАЛЬНЫЙ ИНДИКАТОР КАЧЕСТВА ЖИЗНИ НАСЕЛЕНИЯ – ИИКЖ (СРАВНИТЕЛЬНАЯ ХАРАКТЕРИСТИКА РЕГИОНОВ РОССИИ) Стрижкова Любовь Аркадьевна Федеральное научное бюджетное учреждение «Институт макроэкономических исследований», Москва, Россия lstrig@isr.ru Златоверховникова Татьяна...»

«Sheffield City Region Agreement on Devolution Cllr Simon Greaves The Rt Hon Nick Clegg Leader, Bassetlaw District Council Deputy Prime Minister Cllr Eion Watts Cllr Sir Stephen Houghton CBE Leader, Bolsover District Council Chair, Sheffield City Region Combined Authority Leader, Barnsley Council James Newman Cllr John Burrows Chair, Sheffield City Region Local Leader, Chesterfield Borough Council Enterprise Partnership Cllr Lewis Rose OBE Cllr Julie Dore Leader, Derbyshire Dales District...»

<<  HOME   |    CONTACTS
2016 www.dis.xlibx.info - Thesis, dissertations, books

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.