Assess, Identify and Protect

Real-time surveillance must go well beyond the perimeter

Technology has come a long way since the Sept. 11 terror attacks. ID cards are a lot smarter; biometrics read eyeballs and fingerprints; sensors sniff out explosives; cameras see in the dark — and sophisticated software brings everything together.

The need for security is driven by any of several possible threats associated with the nation’s critical infrastructure (highways, malls, chemical, nuclear or oil plants, etc.), as well as those that impact the lives of millions, but technology alone will not save anyone or anything without a first-rate and professional assessment of your organization’s risk.

Risk assessments enable organizations to integrate their financial objectives with their security objectives, and to make valid security-technology choices. After all, these brilliant devices do not come cheap. If you and your security team do not know what threats you face, then the core building block of your entire security design may be flawed. You will not know how to, or be able to, adequately protect your assets, including your employees, equipment, intellectual property and even your brick-and-mortar buildings.

In addition, if a professional consultant or your in-house security experts are not used to assess your security needs prior to designing a system, the risk of incurring liabilities stemming from the improper implementation of an unstructured program could arise. You risk the loss of efficiency if, for example, interoperability is not considered by the design team. More importantly, you could be protecting the wrong assets or addressing the lesser vulnerabilities while missing the critical vulnerabilities.

Security Flaws on the Perimeter
Traditionally, perimeter security has relied on humans staring at video scenes coming in from CCTV cameras set along the perimeter. Some of these systems can comprise hundreds of cameras and dozens of head-end monitors — and with such a high flow rate of image data, it is not prudent to depend solely on a human operator to monitor events of security significance. The cameras may or may not be coupled with fence sensors and radars, but either way, the security crew ends up monitoring several screens to visually detect or confirm the intrusion. The concentration span of a human watching video monitors and attempting to detect intrusions has been proven to be in the neighborhood of less than 30 minutes. So, a skilled intruder can defeat both the system and the human monitor in many ways.

Even if the system is properly maintained, data coming from a security fence can only provide information about the approximate location of the intrusion. Once the perimeter is breached, security personnel may lose the intruder unless he or she is manually followed with a pan/tilt/zoom camera. Having enough time to complete this task, notify first responders and intercept them — all before the adversary is able to complete their mission — is therefore a gigantic challenge.

Knowing where the threat originated, where it is now, and where it is going is the key objective of any effective security system. Traditional perimeter sensors give very little real-time information to responders. For example, a fence motion sensor surrounding a critical facility with an 8,000-meter perimeter notionally has knowledge of the 8,000-meter fence line. But the fence sensor does not provide discrimination in terms of object recognition, and it only alarms when the fence shakes. It is not enough to be notified of a potential breach at the fence-line perimeter. Intruders must be spotted, identified and tracked from outside the fence; and in a world comprised of the uncontrollable — changing light, clouds drifting, wind blowing, snow falling, dense fog, darkness, etc. — the probability of detection is severely complicated by high false-alarm rates.

“Machine vision technology,” which can spot static problems such as a defect in a semi-conductor chip, has been around for a long time, but historically, it did not cope with an uncontrolled environment. It has to look at a template to spot a problem. Today’s threats have no templates. They demand the most sophisticated image analysis technologies available, and that includes the ability to put real-time detection into a geographic context.

This content continues onto the next page...