Case Studies

Zoned approach to perimeter protection

by Mark Rowe

Fences, walls, intelligent detection technology and the latest surveillance and analytics measures: options for perimeter security are more diverse and complex than ever.

Siemens Building Technologies UK managing director Steven Foxley writes of how to prepare the groundwork for optimum perimeter security and outlines the most important factors to consider.

The UK is on heightened security alert from international terrorism. Damage or destruction to essential services by extremist groups has the potential to threaten public health, disrupt services and even cause loss of life. High risk organisations are often located on large and remote sites, creating vulnerabilities and making safety and security a key issue of concern. Whether the applications are utilities, airports, pharma/chemical, oil and gas or manufacturing, appropriate preventative measures play a vital role in precluding and minimising intrusion, attack and damage. They contribute to the early recognition of offenders and support the rapid introduction of countermeasures as soon as danger is imminent.

The first stage of the planning process requires careful risk analysis to determine the types of possible security threats to the site periphery. There are multiple possibilities including targeted criminal acts, sabotage, attack, hostage taking, espionage, intrusion and burglary. The level of expected damage and the likelihood of occurrence determine the risk potential, which can then be used to establish security objectives and vulnerability. Importantly, before considering the final security concept, the area to be protected needs to be precisely defined.

A site can be threatened from every direction. Therefore dividing the perimeter into clearly structured sectors helps to determine various security measures that make it possible to prepare rapid and secure response to any scenario. Both mechanical and electronic measures can be utilised depending on security objectives.

One of the first steps in defining a security concept is devising appropriate and lasting mechanical security devices. In addition to indicating the property lines, these prevent intrusion into the secured area or movement within it. Naturally occurring features such as ditches, embankments, shrubbery and lakes already provide good perimeter protection that can be reinforced with fencing, bollards, gates, barriers, rising kerbs and pedestrian turnstiles.

The key purpose of a security solution should be is to deter, detect and deny unauthorised intrusion and to communicate these events and provide effective control of any security or hazardous incident:

1. Deter unauthorised intrusion by showing visible and effective security measures
2. Detect activity across multiple site locations through advanced technology
3. Delay intruder attempts to defeat or bypass access control measures
4. Deny access to restricted areas
5. Respond immediately to incidents and provide the means for effective control of critical events

To achieve maximum protection using electronic security, advanced command and control platforms enable integration and control of CCTV, intruder detection, access control and perimeter devices, managing every incident through to conclusion. Automatic number plate recognition (ANPR) and advanced access control systems create a secure environment, controlling who goes where, and when. Video analytics deliver intelligence and information on people management, vehicle monitoring, suspicious behaviour and anomaly detection. Wide area perimeter protection systems safeguard the outer limit of the site, and, in particular, unique solar-powered perimeter solutions deliver savings on civils and installation costs as they are powered by a light source and will remain operational for up to three months, even in total darkness.

For high-security locations, electrified fence detection can be used across zones, with associated cameras, to achieve cause and effect visual verification. An electric pulse is transmitted around the fence at regulated intervals to give a short, powerful but safe, minor electric shock, making it extremely difficult to scale or penetrate. This advanced technology differentiates between alerts from birds, weather and wildlife and a genuine breach. The system monitors and controls the health of the fence at all times, checking it is live and operating at the correct voltage.

Many perimeter based systems focus on trip wires or beams to determine unauthorised intrusion. In contrast, Siemens adopts a zone-based approach, utilising complex criteria to monitor the path of the subject across a scene over a period of time, enabling the analysis of multiple factors such as speed, direction, size and shape to determine a potential intruder from a false alert.

Sensitive areas can be protected by alarm zones, and virtual barriers can be created where it is inappropriate to install physical fences. Alarms can be prompted by simple activities such as vehicles/individuals moving into restricted areas, or via complex parameters such as object speed or size. Secure zones are generated by creating area boundaries on digital site maps, and adjusted using pre-set shortcuts to respond to changing requirements.

It is vital for organisations to consider the adoption of command and control platforms as they create a systematic approach to security, protecting the location, the perimeter and beyond. This is then instrumental in the development of a clear technological roadmap to drive a coherent, joined-up and long-term investment strategy that includes safety and security at its core.

Related News

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing