This article has multiple issues. Please help improve it or discuss these issues on the talk page . (Learn how and when to remove these messages)
|
Perimeter security refers to natural barriers or constructed fortifications designed either to prevent intruders from entering an area or to contain individuals within an enclosed area.
Since at least the Roman Empire, fortifications, walls and barriers have been an important part of protecting sovereign territories and private property. Perimeter security is designed with the primary purpose to either keep intruders out or captives contained within the area the boundary surrounds. Both natural and manmade barriers can serve as perimeter security. [1]
Governments use perimeter security not only for the safety of their citizens, but to control the flow of commerce and immigration, as well as to protect vital infrastructure from attackers. Property owners and organizations of all sizes use various man-made technology to achieve varying degrees of perimeter security.
One of the earliest known instances of perimeter security on a large scale is Hadrian's Wall in the Roman Empire. Around 122 AD, the wall was built along the northern border of the empire out of turf, and later stone. Theories regarding the wall's purpose vary, but most scholars agree it was probably built at least in part for the defense of the empire.
Perhaps the most famous illustration of perimeter security in ancient times was the Great Wall of China. It was originally built to withstand nomadic invaders from the North. The wall was successful to some degree, although it has been suggested that it served as more of a psychological barrier than a physical barrier. [2]
In warfare, securing the perimeter has proven vital to military forces. From sharpened pikes in medieval times to more modern technological solutions, armed forces have always sought to prevent their enemies from breaching their front lines. In the American Civil War and both World Wars, as well as the Korean and Vietnam Wars, landmines were used extensively to create tactical barriers between enemy lines. These tactics are sometimes controversial because of the loss of civilian life. [3]
In World War II, the German military developed concrete barriers called dragon's teeth to slow the approach of enemy tanks. This tactic was adopted by allied forces, and lines of reinforced concrete pyramids can still be seen throughout Europe today.
One example of perimeter protection still in use is razor wire fencing. While U.S. ranchers in the 19th century kept cattle in and rustlers out with barbed wire, World War I saw the advent of specialized barbed wire to secure military operations. [4] [5] The 1965 escalation of the Vietnam War was accelerated by the successful penetration of ten-foot-high concertina wire fencing around Camp Holloway. Variations of this type of perimeter protection were used throughout the 20th century. Booby traps, electric fencing, watchtowers and night flares were also employed to keep enemy forces out.
The mountains, rivers, oceans, deserts, canyons, and glaciers of the world have long provided a natural barrier to invasion and trade among competing groups. A prime example is India's isolation from the rest of Asia due to the Himalayas. [6] The English Channel proved invaluable in World War II as a deterrent to Nazi aggression. [7] England's relative isolation allowed allied forces to use it as a staging area for the D-Day invasion, which turned the tide of the war. The Rocky Mountains in North America proved a formidable perimeter protection of isolated native cultures for centuries. Likewise, exploitation of Alaska's rich resources was greatly delayed while innovation lagged in breaking through the icy and oceanic perimeter.
Technology has largely overcome most of the world's natural barriers. However, deep in the Amazon rainforest remain tribes that are somewhat protected from global society due to the natural barrier of naturally harsh conditions and the vast tributary system of the Amazon River.
A similar argument can be made regarding the world's deserts. Even with advanced technology, the lack of water and harsh temperatures make traversing and living in the world's deserts a journey for a relative few. [8] The Sahara is a prime example.
Invented in the mid-1800s, the chain link fence did not achieve major adoption until industrialized manufacturing began in the United States in 1898. Still in heavy use today, this relatively cost effective perimeter is popular due to its transparency, strength, storage, and ease of installation. From airports to school playgrounds, chain link fencing demand remains strong as a long-term perimeter solution. However, fences alone can be easily circumvented via climbing, cutting, or digging, which has led to well known instances of perimeter breaches, such as at airports and a man scaling the fence at the US White House.
Most perimeter protection solutions in the past have been large-scale, stationary solutions. This causes a great challenge for today's mobile industry and military. With smaller, rapid deployment forces the norm for most of today's military engagements, large walls, high fences, and other permanent solutions aren’t always effective. Deployments in Iraq and Afghanistan provide good examples.
MEMS technology can be used to enhance the effectiveness of fences' protection by incorporating sensors that can detect changes in pressure, vibration, and other physical phenomena.
MEMS, or microelectromechanical [9] systems, are tiny devices that combine mechanical and electrical components on a small scale. They can be used to create sensors that are small, lightweight, and highly sensitive to various physical inputs.
In the context of a perimeter fence, [10] MEMS sensors can be attached to the fenced area. These sensors could detect changes in pressure or vibration caused by someone attempting to climb over or cut through the fence. The sensors then transmit an alert to a security system, allowing security personnel to respond quickly to the attempted breach.
Overall, incorporating MEMS technology into a perimeter fence could provide significant benefits in terms of security, durability, and maintenance. As technology continues to advance, more innovative ways of using MEMS to enhance the security of our physical surroundings could be seen.
Beginning with the advent of electronic sensors, the concept of perimeter security evolved rapidly to include more modern, technological solutions. [11] This allows both private entities and governments to protect wider areas with less manpower involved. In World War II, radar was first introduced to detect airplanes, ships, and later ground targets.
Later, ground surveillance radar was coupled with steerable cameras that were automatically cued onto targets for quick evaluation of the threat. These systems were large and very expensive.
In the military, small force deployment has created complex perimeter protection problems. It has also created opportunities for innovation. Secure wireless communications, lightweight weaponry, faster transport, and portable perimeter protection have all become vital to the success of such missions. Compact surveillance radar (CSR) deployable in minutes provides temporary or portable perimeter security. [12]
While military applications have pressed the innovation for more mobile, affordable perimeter protection, today's security threats have triggered a wave of new products engineered to protect important infrastructure such as airports, bridges, harbors, dams, and electrical substations. These products include thermal cameras, compact radar, microwave and radio wave fences, and biometric scanning, most of which can be linked to smartphone or tablet technology.
A fence is a structure that encloses an area, typically outdoors, and is usually constructed from posts that are connected by boards, wire, rails or netting. A fence differs from a wall in not having a solid foundation along its whole length.
Barbed tape or razor wire is a mesh of metal strips with sharp edges whose purpose is to prevent trespassing by humans. The term "razor wire", through long usage, has generally been used to describe barbed tape products. Razor wire is much sharper than the standard barbed wire; it is named after its appearance but is not razor sharp. The points are very sharp and made to rip and snag clothing and flesh.
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm. Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.
The Gaza–Israel barrier is a border barrier located on the Israeli side of the Gaza–Israel border. Before the Israel–Hamas war, the Erez Crossing, in the north of the Gaza Strip, used to be the only crossing point for people and goods coming from Israel into the Gaza Strip. A second crossing point, the Kerem Shalom border crossing, is used exclusively for goods coming from Egypt as Israel did not allow goods to go directly from Egypt into Gaza through the Egypt–Gaza border, except for the Salah Al Din Gate, which opened in 2018.
The Mexico–United States border wall is a series of vertical barriers along the Mexico–United States border intended to reduce illegal immigration to the United States from Mexico. The barrier is not a continuous structure but a series of obstructions variously classified as "fences" or "walls".
A Jersey barrier, Jersey wall, or Jersey bump is a modular concrete or plastic barrier employed to separate lanes of traffic. It is designed to minimize vehicle damage in cases of incidental contact while still preventing vehicle crossovers resulting in a likely head-on collision. Jersey barriers are also used to reroute traffic and protect pedestrians and workers during highway construction. They are named after the U.S. state of New Jersey which first started using the barriers as separators between lanes of a highway in the 1950s.
A security alarm is a system designed to detect intrusions, such as unauthorized entry, into a building or other areas, such as a home or school. Security alarms protect against burglary (theft) or property damage, as well as against intruders. Examples include personal systems, neighborhood security alerts, car alarms, and prison alarms.
An electric fence is a barrier that uses electric shocks to deter people and other animals from crossing a boundary. The voltage of the shock may have effects ranging from discomfort to death. Most electric fences are used for agricultural fencing and other forms of non-human animal control, although they are also used to protect high-security areas such as military installations or prisons, where potentially-lethal voltages may be used. Virtual electric fences for livestock using GPS technology have also been developed.
A prison escape is the act of an inmate leaving prison through unofficial or illegal ways. Normally, when this occurs, an effort is made on the part of authorities to recapture them and return them to their original detainers. Escaping from prison is also a criminal offense in some countries, such as the United States and Canada, and usually results in time being added to the inmate's sentence, as well as the inmate being placed under increased security that is usually a maximum security prison or supermax prison. In Germany and a number of other countries, it is considered human nature to want to escape from a prison and it is considered as a violation of the right of freedom, so escape is not penalized in itself.
The Secure Fence Act of 2006, also labelled H.R. 6061, is an act of the United States Congress which authorized and partially funded the construction of 700 miles (1,125 km) of fencing along the Mexican border. The Act was signed into law on October 26, 2006, by U.S. President George W. Bush, who stated at the time that the Act would "help protect the American people", would "make our borders more secure", and was "an important step toward immigration reform".
The Tactical Automated Security System (TASS) is a U.S. Air Force intrusion detection and surveillance system used for security monitoring around fixed site airbases, semi-permanent Forward Operating Bases (FOBs), and other mobile tactical deployments.
A Bremer wall, or T-wall, is a twelve-foot-tall (3.66 m) portable, steel-reinforced concrete blast wall of the type used for blast protection throughout Iraq and Afghanistan.
Demarcation of a perimeter, when the protection of assets, personnel or buildings is required, is normally affected by the building of a perimeter fence system. The level of protection offered varies according to the threat level to the perimeter. Different types of perimeter fencing include:
The PJT-531 Battle Field Surveillance Radar – Short Range(BFSR-SR) is a man portable 2D short-range battlefield and perimeter surveillance radar developed by the Indian Defence Research and Development Organisation (DRDO). The BFSR has been designed by DRDO's Bengaluru-based laboratory, the Electronics and Radar Development Establishment (LRDE) and is being manufactured by Bharat Electronics Limited (BEL).
Physical security information management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface. It collects and correlates events from existing disparate security devices and information systems to empower personnel to identify and proactively resolve situations. PSIM integration enables numerous organizational benefits, including increased control, improved situation awareness and management reporting. Ultimately, these solutions allow organizations to reduce costs through improved efficiency and to improve security through increased intelligence.
Future Fibre Technologies (FFT) is a fiber optic sensing technologies company based in Melbourne, Australia, with its US head office in Mountain View, California, Middle East head office in Dubai, Indian head office in New Delhi and European head office in London. Founded in 1994, Future Fibre Technologies product line provides optical fiber intrusion detection systems for perimeters, buried oil and gas pipelines and data communication networks.
The Syria–Turkey barrier is a border wall and fence under construction along the Syria–Turkey border built in an attempt at preventing illegal crossings and smuggling from Syria into Turkey.
Runtime application self-protection (RASP) is a security technology that uses runtime instrumentation to detect and block computer attacks by taking advantage of information from inside the running software. The technology differs from perimeter-based protections such as firewalls, that can only detect and block attacks by using network information without contextual awareness. RASP technology is said to improve the security of software by monitoring its inputs, and blocking those that could allow attacks, while protecting the runtime environment from unwanted changes and tampering. RASP-protected applications rely less on external devices like firewalls to provide runtime security protection. When a threat is detected RASP can prevent exploitation and possibly take other actions, including terminating a user's session, shutting the application down, alerting security personnel and sending a warning to the user. RASP aims to close the gap left by application security testing and network perimeter controls, neither of which have enough insight into real-time data and event flows to either prevent vulnerabilities slipping through the review process or block new threats that were unforeseen during development.
A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter of a property, building, or other secured area. A PIDS is typically deployed as part of an overall security system and is often found in high-security environments such as correctional facilities, airports, military bases, and nuclear plants.
Senstar Corporation develops and manufactures perimeter intrusion detection systems, video management software, security lighting, personal duress systems, and access control software for the physical security and video surveillance industries. Its headquarters are located in Ottawa, Ontario. Senstar products protect facilities around the world, including critical infrastructure sites, military bases, nuclear power plants, airports, personal estates, borders, and correctional facilities.