Raffaele De Astis, President and Executive Managing Director at CIAS Security Inc. discusses how choice of system, integration capability and cost inform what perimeter security technologies to deploy.
Ensuring an effective and highly reliable perimeter security and anti-intrusion solution in high-risk environments can be the ultimate challenge for physical security and IT professionals.
While daytime protection in favorable lighting and weather conditions is relatively easy, nighttime conditions, unfavorable weather like heavy rain, snow, fog or high winds and remote locations with minimal power supply present a much more complex challenge.
Add to that the capability for intercommunication between multiple technologies and cost considerations and it begs the question: what is the most effective solution for a high-risk site?
This article explores what to look for in choosing the best system for your facility, some limitations of technologies and the basic language of the physical security world.
In short, no one technology alone can protect a high-risk perimeter in totality – it requires a layered approach, with systems that work together seamlessly.
There are six basic values in physical and perimeter security that should be taken into consideration to grant maximum protection.
Security and IT professionals should ask the manufacturer or integrator how the technology being recommended measures up to the following:
When considering a new technology or upgrade for perimeter security, these values are important to be aware of, although every technology will have “some” false /nuisance alarms; you want to find the solution that minimizes that number.
While we cannot predict or manage environmental conditions, security managers need to be aware of the system’s performance in extreme environmental conditions.
For example, in heavy rainfall, laser and infrared systems are not as stable or efficient as technologies unaffected by these conditions like microwaves that, by their physical and technical nature, are immune to fog, heavy rain, hail and extreme temperature changes.
Small animals are often the cause of false alarms for perimeter security systems.
If your site is frequently visited by small animals, you should avoid or at least be aware of the limitations of basic systems/technologies with binary logic analysis versus fuzzy logic analysis.
The advantage of fuzzy logic analysis is its ability to compare intrusions with behavior patterns and automatically assign the appropriate value of response time before getting a real alarm.
Fuzzy logic analysis enables the evaluation of small signals (rain, wind, vibrations from vehicular traffic, small accidental impacts) and large signals (climbing, cutting, crossing, lifting, stripping) by comparing them to (256) behavior models (that correspond to environmental factors and intrusion type parameters) studied in the past.
This will reduce perimeter security false alarm rate significantly and keep the probability of detection very high at the same time.
Thermal cameras and infrared barriers have their place in perimeter security and protection, however being aware of their limitations will serve you best in choosing a system.
Working with an integrator/manufacturer to conduct an all-inclusive site design based on the environment is essential.
Microwave technologies have a number of advantages over linear, infrared systems as they offer volumetric detection that covers a larger volume of space (up to 600 feet/200 meters) over linear technology and they are much more difficult to defeat. Intrusions inside the transmitter-receiver’s volumetric field are more sensitive.
Microwave systems with fuzzy logic technology can actually rule out certain intrusions and therefore unwanted alarms.
This analysis drastically reduces false alarm rates because “small signals” are ruled out as an intrusion event and “large signals” are deemed a real event or intrusion.
Fuzzy logic analysis is not a technology deployed by all manufacturers but has a proven track record in reducing the number of unwanted alarms and increasing the probability of detection.
There are multiple fence-mounted intrusion detection systems on the market and the specific requirements of a site and application will determine the best choice in technology.
Choices include microphonic, fiber, shaker, piezo dynamic accelerometer and micro electro-mechanical systems (MEMS)-based technologies.
MEMS is a technology that continuously measures the acceleration on three axes (X, Y, Z). This technology allows you to “see” changes in spatial positioning, then detect movement or changes on a fence or wall.
As it is based on acceleration, disturbances like wind, rain and small impacts are eliminated. MEMS technology analyzes extreme and precise measurement of changes in the three axes with ultimate stability in any environmental condition.
This platform has the ability to collect a massive number of signals with advanced analysis. Coupled with distributed intelligence between sensors along the fence line, the classification of true alarms for perimeter security is enhanced.
Finally, alarm management is another factor to understand and close communication between physical security professionals and their IT counterparts is critical to determining alarm collection (relay, wireless, hard wired) and management.
For a complete picture of the total solution cost and its return on investment (ROI), understanding the general operating costs and management of alarms, future maintenance and/or upgrades as well as labor beyond the initial installation is key to the decision.
There’s no simple answer. In short, one size does not fit all for perimeter security and every site is unique.
Therefore, it is critical to conduct a detailed analysis of the site/situation, alongside a comprehensive technical and economic assessment of the risks and advantages different technologies can lend to a perimeter’s protection.
Budget is also a driving factor for most security managers looking for the best possible solution for perimeter security; therefore, a cost to performance ratio must also be considered.
In our experience, the optimal approach is a synergistic integration of technologies in terms of service continuity and minimal unwanted alarms. A few things to ask your integrator or system manufacturer:
While there are multiple aspects in perimeter security to consider, having the knowledge in asking the right questions will result in making the right decision.
Raffaele De Astis is the President and Executive Managing Director of CIAS Security Inc.
For more than 50 years, CIAS – the Italian-based manufacturer of perimeter security detection systems – has been designing, manufacturing and deploying physical security systems for nuclear sites, correctional facilities, airports and other critical infrastructure installations.
Raffaele is the President of Assosicurezza – the Italian Security Association and has received a Certificate of Appreciation from the Governor for his participation in implementing the perimeter security system for the North Carolina Museum of Art in Raleigh.
This article was originally published in the November edition of Security Journal Americas. To read your FREE digital edition, click here.