Perimeter security - the future is now

Perimeter security - the future is nowWhat images do you have when mentioning perimeter security? Something about fences, “God’s dandelion” grandmothers with Berdans, a bunch of cameras and spotlights? Alarms? Yes, something similar happened a long time ago.

In connection with recent events, the approach to monitoring the protection of buildings, sections of the state border, water areas and extended open spaces will change dramatically.

In this post, I want to talk about the problems of existing classical systems, and about what changes are happening now in the field of security systems. What is a thing of the past, and what is already used in modern security systems.

How was it before?

I was born in a closed city, and from childhood I got used to the permit regime, concrete fences, soldiers and barbed wire. Now I can hardly imagine what a titanic effort it took to ensure reliable protection of the perimeter of the whole city.

Perimeter security - the future is now

Preparing the area for the installation of concrete fences is work with draining swamps, tons of land and forest. And you also need to install perimeter sensors (detectors), cameras, lighting. All this must be supported by a huge operation group: the equipment needs updating, seasonal adjustment and repair.

Many security detectors began to be developed in the USSR back in the 70s of the last century in my and several other cities. Since that time, the principle of their work “violated-ringed” has not changed much, and reliability and noise immunity have increased. The element base and production technology have also been improved.

In fact, both then and now, the detector only generates an alarm when an intruder is detected in the protected area.

Of course, you can add bars, cameras, spotlights to this, put up concrete fences and create several security lines.

But all this only increases the cost of the security complex and does not eliminate the main drawback of the “classical” systems. The time of "interaction" of an experienced intruder with the border is only a few seconds. Until the moment of the invasion and after it, we know nothing about his actions.

And this means that you can not have time to take the necessary measures before crossing the perimeter of the object and get a big headache after the invasion.

What would be the ideal security system?

For example, this:

  1. Detect the intruder before crossing the border of the protected zone. At a distance, say, 20-50 meters from the fence. After that, the system should monitor the trajectory of the intruder before the moment of intrusion and after it. The intruder's trajectory and video surveillance footage are displayed on the monitors of the security service.
  2. At the same time, the number of surveillance cameras should be minimal so as not to increase the cost of the security complex and not overload the eyes and brains of security personnel.

Now radar security systems (RLS) have similar functions. They detect moving objects, identify the intruder, determine the location (range and azimuth) of the intruder, its speed, direction of movement and other parameters. Based on these data, it is possible to build a trajectory of movement on the plan of the object. This makes it possible to predict the further movement of the intruder to important objects within the protected area.

Perimeter security - the future is now
An example of displaying information of a radar security complex on the monitor of the security service.

Such a radar system operates within the field of view from tens of degrees to 360 degrees in azimuth. Video cameras complement the visualization. With the help of radar data, the turntable of the video cameras provides visual tracking of the intruder.

To completely cover the territory of an object with an extended perimeter (from 5 to 15 km), only a few radars with a viewing angle of up to 90 degrees may be enough. In this case, the locator that detected the intruder first follows him and analyzes the parameters of his movement until the intruder enters the field of view of another locator and another camera.

As a result, the object is constantly under the control of the operator of the security service.
This concept of building a security system is informative, quite efficient and ergonomic.

Here is an example of a real operation of such a system:


Ready to continue posting. For example, about systems to counter UAVs and drones and modern composite fences (an alternative to reinforced concrete fences).

Source: habr.com

Add a comment