Perimeter intrusion detection

Last updated
A fence-mounted perimeter intrusion detection system installed on a chain link fence. Fence-mounted perimeter intrusion detection system.jpg
A fence-mounted perimeter intrusion detection system installed on a chain link fence.

A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter of a property, building, or other secured area. [1] [2] A PIDS is typically deployed as part of an overall security system and is often found in high-security environments such as correctional facilities, airports, [3] military bases, and nuclear plants. [4]

Contents

Types of PIDS

A wide range of intrusion detection technologies exist in the current marketplace. The U.S. Army, as part of their reference material for personnel responsible for planning and executing security programs, divides PIDS technologies into the following categories: [5]

Primary Application

A PIDS typically acts as an early warning system, alerting a site's alarm system while the intruder is still at the perimeter and not yet in a building or other interior area. A PIDS isn't a replacement for surveillance cameras. The two technologies work together, with PIDS providing early intrusion detection while cameras provide real-time assessment capabilities. [6] PIDS are often integrated with other security products like signage, security lighting, intercom systems, or loudspeakers to help deter potential intruders.

Related Research Articles

<span class="mw-page-title-main">Physical security</span> Measures designed to deny unauthorized access

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm. Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.

An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.

<span class="mw-page-title-main">Security alarm</span> System that detects unauthorised entry

A security alarm is a system designed to detect intrusions, such as unauthorized entry, into a building or other areas, such as a home or school. Security alarms protect against burglary (theft) or property damage, as well as against intruders. Examples include personal systems, neighborhood security alerts, car alarms, and prisons.

<span class="mw-page-title-main">Electric fence</span> Shock barrier to contain animals or people

An electric fence is a barrier that uses electric shocks to deter people and/or other animals from crossing a boundary. The voltage of the shock may have effects ranging from discomfort to death. Most electric fences are used for agricultural fencing and other forms of non-human animal control, although they are also used to protect high-security areas such as military installations or prisons, where potentially-lethal voltages may be used. Virtual electric fences for livestock using GPS technology have also been developed.

<span class="mw-page-title-main">Passive infrared sensor</span> Electronic sensor that measures infrared light

A passive infrared sensor is an electronic sensor that measures infrared (IR) light radiating from objects in its field of view. They are most often used in PIR-based motion detectors. PIR sensors are commonly used in security alarms and automatic lighting applications.

<span class="mw-page-title-main">Motion detector</span> Electrical device which utilizes a sensor to detect nearby motion

A motion detector is an electrical device that utilizes a sensor to detect nearby motion. Such a device is often integrated as a component of a system that automatically performs a task or alerts a user of motion in an area. They form a vital component of security, automated lighting control, home control, energy efficiency, and other useful systems.

<span class="mw-page-title-main">Home security</span> Set of practices to protect homes against crime

Home security includes both the security hardware placed on a property and individuals' personal security practices. Security hardware includes doors, locks, alarm systems, lighting, motion detectors, and security camera systems. Personal security involves practices like ensuring doors are locked, alarms are activated, owning a Dog, windows are closed, and extra keys are not hidden outside.

<span class="mw-page-title-main">Prison escape</span> An inmate leaving prison unlawfully

A prison escape is the act of an inmate leaving prison through unofficial or illegal ways. Normally, when this occurs, an effort is made on the part of authorities to recapture them and return them to their original detainers. Escaping from prison is also a criminal offense in some countries, such as the United States and Canada, and it is highly likely to result in time being added to the inmate's sentence, as well as the inmate being placed under increased security that is most likely a maximum security prison or supermax prison. In Germany, and a number of other countries, it is considered human nature to want to escape from a prison and it is considered as a violation of the right of freedom, so escape is not penalized in itself.

A red team is a group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses. Red teams work for the organization or are hired by the organization. Their work is legal, but can surprise some employees who may not know that red teaming is occurring, or who may be deceived by the red team. Some definitions of red team are broader, and include any group within an organization that is directed to think outside the box and look at alternative scenarios that are considered less plausible. This can be an important defense against false assumptions and groupthink. The term red teaming originated in the 1960s in the United States.

Infrastructure security is the security provided to protect infrastructure, especially critical infrastructure, such as airports, highways rail transport, hospitals, bridges, transport hubs, network communications, media, the electricity grid, dams, power plants, seaports, oil refineries, liquefied natural gas terminals and water systems. Infrastructure security seeks to limit vulnerability of these structures and systems to sabotage, terrorism, and contamination.

<span class="mw-page-title-main">Tactical Automated Security System</span>

The Tactical Automated Security System (TASS) is a U.S. Air Force intrusion detection and surveillance system used for security monitoring around fixed site airbases, semi-permanent Forward Operating Bases (FOBs), and other mobile tactical deployments.

<span class="mw-page-title-main">Perimeter fence</span>

Demarcation of a perimeter, when the protection of assets, personnel or buildings is required, is normally affected by the building of a perimeter fence system. The level of protection offered varies according to the threat level to the perimeter. Different types of perimeter fencing include:

A gas detector is a device that detects the presence of gases in an area, often as part of a safety system. A gas detector can sound an alarm to operators in the area where the leak is occurring, giving them the opportunity to leave. This type of device is important because there are many gases that can be harmful to organic life, such as humans or animals.

Diver detection sonar (DDS) systems are sonar and acoustic location systems employed underwater for the detection of divers and submerged swimmer delivery vehicles (SDVs). The purpose of this type of sonar system is to provide detection, tracking and classification information on underwater threats that could endanger property and lives. Further, this information is useful only to the extent that it is made available to authorities in time to make possible the desired response to the threat, be it deterrent or defensive action. Subsurface threats are a difficult problem, because reliable detection is available to date chiefly by use of high-resolution active sonar or trained dolphins or sea lions. The threat of an underwater terrorist attack is a concern to the maritime industry and port law enforcement agencies. Ports face a range of threats from swimmers, boat-delivered ordnance such as limpet mines and other forms of improvised underwater explosive devices. DDS systems have been developed to provide underwater security for ports, coastal facilities, offshore installations, pipelines and ships. Due to the variety of life and objects that exist under the water, it is desirable that a DDS system be capable of distinguishing between large sea mammals, shoals of fish; a ship's wake; a diver with an open circuit scuba set and a stealth diver with a rebreather. DDS systems have been developed that can be mounted on the seabed, on a pier or on the hull of a vessel. For complete port security these systems are integrated with the surface surveillance and security systems employed at ports, coastal facilities and offshore installations. Various systems provide specialized features to facilitate their use in port security systems including automatic detection features.

<span class="mw-page-title-main">Unattended ground sensor</span> Unattended ground sensor

The Unattended Ground Sensor (UGS) are a variety of small sensors, generally covert, dedicated to detect and identify activities on the ground such as enemy soldiers or vehicles. UGS come as systems with an integrated communication network and processing capabilities.

<span class="mw-page-title-main">Future Fibre Technologies</span>

Future Fibre Technologies (FFT) is a fiber optic sensing technologies company based in Melbourne, Australia, with its US head office in Mountain View, California, Middle East head office in Dubai, Indian head office in New Delhi and European head office in London. Founded in 1994, Future Fibre Technologies product line provides optical fiber intrusion detection systems for perimeters, buried oil and gas pipelines and data communication networks.

A driveway alarm is a device that is designed to detect people or vehicles entering a property via the driveway. A driveway alarm system is often integrated as a component of a system which automatically performs a task or alerts home owners of an unexpected intruder or visitor. Driveway alarms can be a vital component of security, automated lighting control, home control, energy efficiency, and other useful systems.

<span class="mw-page-title-main">Artificial intelligence for video surveillance</span> Overview of artificial intelligence for surveillance

Artificial intelligence for video surveillance utilizes computer software programs that analyze the audio and images from video surveillance cameras in order to recognize humans, vehicles, objects, attributes, and events. Security contractors program the software to define restricted areas within the camera's view and program for times of day for the property being protected by the camera surveillance. The artificial intelligence ("A.I.") sends an alert if it detects a trespasser breaking the "rule" set that no person is allowed in that area during that time of day.

Perimeter security refers to natural barriers or built fortifications to either keep intruders out or to keep captives contained within the area the boundary surrounds.

Senstar Corporation develops and manufactures perimeter intrusion detection systems, video management software, security lighting, personal duress systems, and access control software for the physical security and video surveillance industries. Its headquarters are located in Ottawa, Ontario. Senstar products protect facilities around the world, including critical infrastructure sites, military bases, nuclear power plants, airports, personal estates, borders, and correctional facilities.

References

  1. "Perimeter intrusion detection: The first line of defense". Security Info Watch. 2018-01-19. Retrieved 2020-01-29.
  2. "Perimeter Intruder Detection".
  3. Ron, Raphael. Airport Security: A National Security Challenge. German Marshall Fund of the United States, 2013, www.jstor.org/stable/resrep18671. Accessed 18 Feb. 2020.
  4. Halsey, D. J. (1982-04-01). "Nuclear-power-plant perimeter-intrusion alarm systems". doi: 10.2172/5359416 . OSTI   5359416.{{cite journal}}: Cite journal requires |journal= (help)
  5. "Army Tactics, Techniques, and Procedures ATTP 3-39.32s". Army Publishing Directorate.
  6. "StackPath". www.securityinfowatch.com. Retrieved 2020-10-21.