IFSEC Insider is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Chartered Security Professional (CSyP) and certified technical security professional (CTSP)
Author Bio ▼
Peter is an expert in the physical security industry having spent 35 years gaining considerable knowledge and understanding of security technology and the principles and practices of protecting people and assets, along with the ethics necessary for leading a respected company. Over 20 years as MD of multi-award-winning security system integrator 2020 Vision Systems, the company achieved a high standard of recognition and the patronage of many respected organizations. Through his dedication and leadership, 2020 obtained industry approval with the SSAIB and Quality, Environmental, and Health and Safety accreditations.Peter is a member of the Security Systems and Alarms Inspection Board (SSAIB), a UKAS accredited Certification Body, and its representative on the British Standards Institute (BSI) technical committee responsible for drafting European CCTV Standards. He is also a member of the Security Institute and Security Leaders Technology forum and the author of a number of published security articles.
September 9, 2015
Sign up to free email newsletters
Nothing found. Please check your show/episode id.
Download
State of Physical Access Trend Report 2024
Need Perimeter Intrusion Detection? Here Are Your Options and How to Decide
There are a number of detection technologies in today’s arsenal today for detecting persons or vehicles penetrating a facilities perimeter boundary. However, no single optimum solution for all security applications exists, and each technology type has its place dependent on the site and organisation requiring protection.
Five major factors influence the choice of technology when considering implementing a perimeter detection system; risk, location, terrain, structure and standards.
Foremost, the technology must be commensurate with the risk requiring protection and the sophistication of any potential assailant(s) and their likely method of penetration. The chosen technology must be suitable for the geographic location; harsh environment, climate; rainy, dry etcetera and the terrain and topography; hilly, marsh, flat.
It also needs to be appropriate for the structure in will be installed on or within. Finally, it must meet with any national or local standards – eg BS EN5013 – or planning permission.
Dependent on the organisation or risk it is also advisable to consider using complementary technologies to either increase detection rate (security) or decrease nuisance and false alarm rates by requiring both technologies to go into alarm before triggering an alert.
Of equal importance with perimeter detection technology is good house-keeping. Keeping structures in good repair is essential. Maintaining the grounds, cutting down bushes and clearing litter adjacent to and around sensors is necessary.
Although this list is not exhaustive, it does provide examples of influencing factors.
Where high level but discrete security is required – such as a high net worth individual or national monument – or where no perimeter physical barrier exists and there is open area, the use of a buried wire system would prove appropriate.
However, what needs detecting – human or vehicle – the method of attack, the geographic location and the ground composition need consideration, ensuring the correct type of buried wire system is specified.
Investigating planning consents may also be necessary. Such a system is difficult to defeat, provides a wide detection zone and is immune to most environmental nuisance alarms.
Where there is an existing suitable perimeter fence, a fence-mounted continuous sensor cable can be attached directly to the fence, usually with UV-resistant cable ties. The sensor type either detects vibrations and uses sophisticated digital processing to ascertain if someone is climbing, cutting or lifting the fence or makes use of micro-phonic cable.
Alternatively, if there is no existing barrier but some form of physical barrier is required then a taut wire system would be appropriate. As the name suggests, multiple, horizontal, smooth or barbed wires tightly stretch along a typical segment of 60 metres that is connected to a sensor post located halfway between adjacent anchor posts.
D-TECT Inovonics wireless detector from GJD
An electro-mechanical sensor detects a predetermined amount of deflection in the cable to initiate an alarm. Clearly, topography needs to be considered and ground composition in the use of this technology to prevent burrowing or crawling under the fence.
Again, planning consent will almost certainly be required, as will good housekeeping, keeping the fence maintained and clearing litter and debris. Some of these fence-based systems are also applicable to perimeter walls.
Another solution, and one that is both cost -effective and suitable for protecting fence and walls, is fibre optic cable. These systems cover large distances and are moisture- and electo-interference-resistant.
Infrared sensors
For medium applications, the use of active infrared sensors (beams) or bistatic microwave systems, which tend to be cheaper than buried wire or fence-based solutions, should be considered. However, these systems require line of sight and can be prone to inclement weather or objects blowing.
For low risk use, external passive infrared detectors or microwave sensors, which are best suited to external areas of trap protection or to supplementing other detection methods, can prove a cost effective solution for low-level, unsophisticated challenges. However, though they are cheap and easy to install, they are also prone to nuisance alarms and relatively easy to nullify.
One of the most effective perimeter detection systems is the electric fence, which provides both a convincing deterrent and an alert should an attempt made to breach it. The main concern here is the accidental risk of electric shock to innocent people, making its use best restricted to protect access across or through a six inch high wall or behind a first-stage physical barrier.
Just as increasingly popular in securing perimeters is the use of thermal cameras. These devices are immune to weather effects and cover long distances and can incorporate either analytics or supplement other devices.
In conclusion, it is necessary to carefully evaluate the threat, the structure, terrain and location and carefully study the manufacturers’ literature to ascertain the most appropriate solution or combination of technologies for a given application and budget.
Reference material
a&s International ( August 2011) Sharpen Your Senses: Securing Boundaries with Perimeter and Intrusion Detection Technologies. [online] Available at http://www.asmag.com/showpost/12041.aspx [Accessed on 27th October 2014]
BICSI (July 2012). Electronic Safety and Security Design Reference Manual, Third edition. BICSIÒ ISBN 1-928886-60-4
Listen to the IFSEC Insider podcast!
Each month, the IFSEC Insider (formerly IFSEC Global) Security in Focus podcast brings you conversations with leading figures in the physical security industry. Covering everything from risk management principles and building a security culture, to the key trends ahead in tech and initiatives on diversity and inclusivity, the podcast keeps security professionals up to date with the latest hot topics in the sector.
Available online, and on Spotify, Apple Podcasts and Google Podcasts, tune in for an easy way to remain up to date on the issues affecting your role.
Need Perimeter Intrusion Detection? Here Are Your Options and How to DecideFive key factors influence the choice of technology: risk, location, terrain, structure and standards. Budget is of course a separate constraint.
Peter Houlis
IFSEC Insider | Security and Fire News and Resources
Related Topics
Homelessness charity enjoys safety and security improvements at community home
Guide on food and drink industry security highlights the threat from within
Protecting data centres with a resilient perimeter solution
Subscribe
6 Comments
Oldest
NewestMost Voted
Inline Feedbacks
View all comments
Primal
September 13, 2015 8:29 pm
Damasec OPTEX intrusion detectors provide #perimeter security #protection for UK logistics company http://pri.ml/QH6g-VJj
Moyanga
September 15, 2015 7:10 pm
How and whom can I contact in RSA regarding the buried wire perimeter protection?
tss01
September 16, 2015 10:43 am
Moyanga you are welcome to contact TSS Security on 011 465 8939 and ask to speak to Barend or JP
Trisonix
September 18, 2015 2:53 pm
In my opinion thermal cameras provide the best solution and one may not need anything else. It can detect intruder day/night and in almost all weather conditions. It can also be used for pre-emptive security rather than forensic which is what almost all the technologies mentioned above do. If we have analytics at the edge which can make it intelligent and give alarms only for people/vehicles/boats – all the better. It would turn out to be cheaper if we take the life cycle costs also.
RobBenton
December 7, 2015 9:53 pm
I agree that good housekeeping is an additional method to maintaining perimeter safety. I heard of another idea, but it’s not something the average person could afford. That is, one could do what Marc Zuckerberg did and build four houses around the house you actually live in. I feel that doing so would greatly decrease chances of intrusion. http://www.kiwifencing.com/new-zealand-electric-fencing.html
George Schildge
June 17, 2017 7:47 pm
I’d like to know what type if systems (PIDS) exist for the utilities and oil & gas sectors. The attack, which nearly took out power to parts of Silicon Valley, has been called “the most significant incident of domestic terrorism involving the grid that has ever occurred” by the nation’s top electrical utility regulator.
Is there a system that eliminates both by taking you inside your threat, revealing its operations, patterns, and likely intent, allowing you to respond more deliberately and effectively and reduce your likelihood for loss. Something that could protect a substation from 5 miles out.
Damasec OPTEX intrusion detectors provide #perimeter security #protection for UK logistics company
http://pri.ml/QH6g-VJj
How and whom can I contact in RSA regarding the buried wire perimeter protection?
Moyanga you are welcome to contact TSS Security on 011 465 8939 and ask to speak to Barend or JP
In my opinion thermal cameras provide the best solution and one may not need anything else. It can detect intruder day/night and in almost all weather conditions. It can also be used for pre-emptive security rather than forensic which is what almost all the technologies mentioned above do. If we have analytics at the edge which can make it intelligent and give alarms only for people/vehicles/boats – all the better. It would turn out to be cheaper if we take the life cycle costs also.
I agree that good housekeeping is an additional method to maintaining perimeter safety. I heard of another idea, but it’s not something the average person could afford. That is, one could do what Marc Zuckerberg did and build four houses around the house you actually live in. I feel that doing so would greatly decrease chances of intrusion. http://www.kiwifencing.com/new-zealand-electric-fencing.html
I’d like to know what type if systems (PIDS) exist for the utilities and oil & gas sectors. The attack, which nearly took out power to parts of Silicon Valley, has been called “the most significant incident of domestic terrorism involving the grid that has ever occurred” by the nation’s top electrical utility regulator.
Is there a system that eliminates both by taking you inside your threat, revealing its operations, patterns, and likely intent, allowing you to respond more deliberately and effectively and reduce your likelihood for loss. Something that could protect a substation from 5 miles out.