Perimeter security: because walls alone are not enough.
Transcription
Perimeter security: because walls alone are not enough.
Siemens Switzerland Ltd Infrastructure & Cities Sector Building Technologies Division International Headquarters Gubelstrasse 22 6301 Zug Switzerland Tel +41 41 724 24 24 The information in this document contains general descriptions of technical options available, which do not always have to be present in individual cases. The required features should therefore be specified in each individual case at the time of closing the contract. Subject to modifications. © Siemens Switzerland Ltd, 2012 Printed in Germany (03/2012). Answers for infrastructure. Our world is undergoing changes that force us to think in new ways: demographic change, urbanization, global warming, and resource shortages. Maximum efficiency has top priority – and not only where energy is concerned. In addition, we need to increase comfort for the well-being of users. Also, our need for safety and security is constantly www.siemens.de/buildingtechnologies growing. For our customers, success is defined by how well they manage these challenges. Siemens has the answers. “We are the preferred partner for energy-efficient, safe, and secure buildings and infrastructure.” Perimeter security: because walls alone are not enough. Individual security concepts and intelligent systems for your outdoor space. Answers for infrastructure. Every building is different. Every one of our solutions is, too. With a strategically thinking partner like Siemens by your side, you will benefit from bundled expertise and values gained from many years of experience. Prepare the groundwork for your individual perimeter security solution while working together with us. Good planning is the best prevention An extensive industrial site clearly requires different protection than a museum in a historical building. There are good reasons why perimeter security now has a diverse product portfolio with intelligent technologies to offer. However, for perimeter security to perform its most important prevention tasks, it requires one thing above all: carefully thought-out planning. Perimeter security is more than just the details. Fences, walls, intelligent detection technology, and the latest surveillance measures: today the options for comprehensive perimeter security around a property are more diverse and complex than ever before. And that’s a good thing. Whether for VIPs, airports, forensics, penal institutions, industrial properties with high security requirements (such as logistics or chemical companies), solar facilities, outside warehouses, or power plants, appropriate preventive measures help to preclude or minimize damage. They contribute to the early recognition of offenders and support the rapid introduction of countermeasures as soon as danger is imminent. All to achieve one thing: the optimal solution for you A wide range of different threat scenarios exist. Therefore we mark out the premises for your individual security objectives together with you and analyze what makes your grounds so special. This knowledge and our over 160 years of experience make it possible for us to select ideal components from the product ranges of different manufacturers and thus create the best integration options. Either in your existing infrastructure or in a completely new facility. With you on site Think globally, act locally. This is an important advantage, particularly in the case of complex perimeter security: Your personal Siemens staff member on site will become familiar with your needs and will be there for you during the preparation, wrap-up, and during installation. In the process, the staff member will benefit from the expertise and options provided by a worldwide network of specialists. Thus our expertise in the development of individual security concepts also gives you the long-term security of being in the best hands. For optimal protection of your investment, beyond the development and implementation of your solution we of course offer you all continuing services necessary for the smooth operation of your security systems. The most important factors at a glance Intelligent, integrated concepts for complete perimeter security Developing a manufacturerindependent solution that is optimally adapted to your needs Expertise from the security concept to the implementation of different technologies A contact provides the necessary transparency in a complex field A broad portfolio for diverse applications Bringing all technologies together in a single user interface Integrating already existing infrastructure Integrated service concept and high availability of service technicians However, just as it is not enough to stack individual building blocks on top of each other to form a wall, perimeter security requires a suitable “mortar” that binds all the parts together and optimally balances them for perfect stability. We are happy to create this connection for you. With individual security concepts that have one objective above all others: complete security. For the entire premises. 2 3 What’s most important comes first: thinking ahead in all directions. What do possible threat scenarios look like? What characterizes offenders who have targeted your company? How are your external grounds secured? As the ones who do your advance thinking for you with regard to prevention, we completely immerse ourselves in your company’s situation, working step by step to develop an optimally adapted security concept for you. Security is a feeling – and a fact. While in a certain sense feeling secure can be a very subjective thing, we first analyze your actual security needs for you and use this as a basis to develop an integrated security concept that factors in all securityrelevant questions concerning perimeter security. This provides you with an overview – with optimal transparency and maximum assurance in making decisions. At the beginning, there is risk analysis Every property is different and is “predestined” in its own way to vulnerabilities from different threats and offenders. For this reason, the first thing we do in our analysis is to determine the types of possible threats your building periphery is exposed to as well as the profiles of potential offenders or offender groups. After site inspections and interviews, we prepare the individual security profile in cooperation with you. In the process, it is worth considering that threats to a property can emanate from two scenarios. 4 On the one hand, from targeted criminal acts, such as sabotage, attack, hostagetaking, intrusion, burglary, or espionage. And on the other hand, from random criminal acts, such as vandalism or demonstrations by people prepared to use violence. The damage to be expected and its likelihood of occurrence determine the risk potential, which in turn can be used to determine security objectives and weak points. Your security goals: a matter of definition Before we consider how your security concept would appear in its ideal form, we first need to define more precisely the area to be protected. Depending on the local conditions, within the framework of the risk analysis we define if and how the legal boundary line is shown as well as if and how special security measures are used before this line. Furthermore, we clarify the best way to protect you from intrusions, breakouts, and vandalism or from the illicit transfer of products or money. All good things come in threes: your security measures After this preliminary work, we can derive the additional security measures – from the technical solution to its coordination and connection. Generally, a property is only well protected if the resistance time of a mechanical security measure is equal Overview of security measures rganizational O and personnel measures Mechanical and physical measures Electronic surveillance and detection measures to or greater than the reaction time the guards need to arrive on site. Mechanical security measures One of the first steps in defining a security concept is devising appropriate – and lasting – mechanical security devices. In addition to indicating the property lines, the purpose of mechanical security measures is to prevent intrusion into the secured area or movement within it. In many cases, naturally occurring features – such as ditches and embankments, thorn bushes, moats, and ponds – already provide good perimeter protection that can be reinforced with fences, boulders, bollards, and road blocks. Nevertheless it should be taken into account that mechanical security still needs to function properly if weather conditions change. Electronic monitoring For different applications, such as fence surveillance, detectors that secure the ground area, or different detection devices that monitor smaller or larger spaces, Siemens can offer you the best solutions. Organizational measures If anything is detected, notification will be conveyed to the appropriate sites. In this case, only the interventions that have been specifically agreed upon for the property will be initiated. Thus everything is perfectly organized. At the end, there is the overall concept An overall concept includes securing both the inside and outside of buildings and consists of the synergistic total of individual measures to achieve the desired security objectives. Profit from our experience and focus on an overall solution. For your secure satisfaction. Step by step to the security concept Step 1: Risk analysis Describing possible threat scenarios and perpetrator profiles, determining risk potential and vulnerabilities. Step 2: Security objectives The most important security objectives are determined depending on the local conditions, for example, indicating the property line or protecting against vandalism. Step 3: Security measures The mechanical, electronic, and organizational security measures are derived from the security objectives. Security concept In the end, there is the overall concept that optimally aligns all security measures with each other. 5 An overview of the detectors Adaptability is everything. Therefore, application-specific sensors that have been optimally adjusted to the requirements of their respective fields of application are used to electronically survey critical outdoor spaces and to monitor fences, boundaries, and rooftops as well as to always keep the focus on your security. 1. Active IR light barrier The most important application areas at a glance: Our building blocks for perimeter security 6. The most important application areas at a glance: Gate areas Window fronts Fence climb over Using our overview graphic, we have provided you with examples of where each perimeter security solution can be used to best effect. High-frequency signal cables Open spaces between fences Green spaces Pathways 7. Ground sensors The most important application areas at a glance: Open spaces between fences Green spaces Pathways 9. 1. 10. 3. 2. Microwave detectors The most important application areas at a glance: Area between fences (“sterile” zones) Rooftop areas 3. The most important application areas at a glance: 8. 8. Laser scanners Rooftop areas Facades Fence climb over IR motion detectors The most important application areas at a glance: 7. 6. Smaller open spaces Dedicated areas next to fences Pathways 9. Radar sensor The most important application areas at a glance: Large, flat open spaces 4. 5. 4. Video sensors The most important application areas at a glance: Open spaces Areas near fences Rooftop areas 5. 10. Microphone sensor cables The most important application areas at a glance: The most important application areas at a glance: Conventional fences 2. 6 Fiber-optic sensor cables Long fences Long properties in the ground (pipelines, cable lines) 11. Fence sensors The most important application areas at a glance: Individual fence panels Fences with different structural forms 11. 9 Four sectors for comprehensive security. Your property can be threatened from every direction. Therefore, dividing your perimeter into clearly structured sectors helps to determine various security measures that make it possible to prepare rapidly and securely for any scenario. Sensitive sensors – reliable detection. Different security objectives demand different sensors. As a result, the following criteria should be considered when deciding on electronic detection measures: – Reliability of detection – Number of unwanted notifications – Deception possibilities – Security against tampering – Security against transmission Active IR light barriers – Interfaces with other subsystems – Installation option – Service-friendliness – Visibility Effectiveness: Light barriers are suitable for monitoring lines along fences and gates and for curtain monitoring of properties, windows, and walls. This monitors any persons or vehicles entering the property while also monitoring passage and access. Detection principle and specification – Systems consist of transmitter and receivers with one or more light beams – Monitor the light beam for interruption and manipulation by extraneous light – Any interruption of the light beam by intruders will be reliably recognized Microwave detectors Effectiveness: They are used to monitor lines along fences, on rooftops, and over large areas and report anyone who walks into or drives through the surveillance area. Sector 0 Perimeter security areas Monitored perimeter areas are divided into four sectors so you can find the optimal orientation and plan. Both mechanical and electronic measures can be allocated according to your security objective. Sector 0 A single, specific strip of ground that lies outside the perimeter area to be protected. In this sector, it is possible to hinder and detect an unauthorized approach. 10 Sector 1 Sector 1 A closed boundary line along the perimeter area that may be defined, for example, by a fence, wall, or moat, and that prevents or detects crossing into this sector. Sector 2 The entire area within the perimeter without buildings or facilities to be protected. Entry into this sector or movement within it should be hindered or detected. Sector 2 Detection principle and specification – The sensor consists of separate transmitting and receiving units and creates a volumetric electromagnetic field between them – Changes to the field due to absorption or reflection of objects or people in the detection area are consistently recognized Sector 3 Sector 3 A space within sector 2 that encompasses the buildings or facilities requiring protection. A possible surveillance objective may be to detect anyone who is entering, climbing, or damaging such buildings or to prevent these from happening. Using the color-mapping of the individual sectors, it is possible to see the respective effectiveness in the corresponding areas in the following overview. Laser scanner Effectiveness: Sector 0 Sector 1 Sector 2 Sector 3 Pros and cons Good monitoring of linear stretches. The monitoring height can be flexibly varied by individually configuring the columns. Limited functionality in the event of poor visibility (monitoring approx. 1.5 m × visibility range). Surveillance area / detection – Up to approx. 100 m range, height: 0.5 to 5 m – Good detection rate, few false alarms – Beams per column: 2 to 16 – It is not possible to locate an object precisely within the zone Sector 0 Sector 1 Sector 2 Sector 3 Pros and cons Due to its high sensitivity, this solution enables good detection under almost any weather conditions at a height of up to 15 m. However, it is less suitable when narrow detection zones of less than 2 m are required. Surveillance area / detection – Height/width of field depending on type and distance up to a maximum of 500 m – Large overlaps of detection fields are necessary if larger distances with multiple sensors in a row are monitored Sector 0 Sector 1 Sector 2 Sector 3 They serve as curtain sensors for properties or penetration detectors for walls and larger flat, open spaces (for example, zones between two fences) and monitor possible access as well as anyone walking or driving into the area. Pros and cons This first-rate solution proves itself through its significantly low false-alarm rate and can be installed easily in all areas. Additionally, it offers the option of concealed mounting. Detection principle and specification – They scan the surrounding area in two dimensions with laser beams – Objects and people are detected using time-of-flight measurement of the reflected light, and their size, distance, and speed with regard to the sensor are determined Surveillance area / detection – Range of approx. 100 m, scanning angle of max. 270° – Exact localization of an object, universally adjustable detection areas and object properties, multiple alarm zones that can be adjusted with different parameters 11 Video sensors Effectiveness: Video sensors are used to automatically detect people or objects who are within the viewing range of a video camera. Detection principle and specification –T he video sensors use algorithms to define objects that should be recognized or followed in the video image – In the video image, the algorithms recognize objects and people who move within a camera’s viewing range Microphone sensor cables Effectiveness: Monitors manipulation, such as cutting through or climbing over fences (for example, chain-link or lattice fences). Detection principle – The sensor cable is attached to the fence –T he slightest vibrations of the fence influence the cable’s electrical behavior –V ibrations on the fence caused by intruders are immediately recognized and analyzed – In contrast to analog systems, digital systems can precisely localize alarms using time-offlight measurement High-frequency signal cables Effectiveness: They report any persons or vehicles that enter the property and are ideally suited to area surveillance of open spaces and paths or for monitoring uneven ground or areas under trees. Detection principle and specification – Invisible HF field between two concealed sensor cables buried in the ground – Changes to the field caused by intruders are recognized and evaluated Ground sensors Effectiveness: Pressure-change systems react to any persons or vehicles entering the property and are ideal for area surveillance of open spaces and paths or of uneven ground. Detection principle and specification – Concealed individual sensors are networked with each other – They work dynamically and transform changes in pressure into electrical signals via piezo elements – Changes to the field caused by intruders are recognized and evaluated 12 Sector 0 Sector 1 Sector 2 Sector 3 IR motion detectors They report anyone entering large areas on foot or by vehicle or, in the case of curtain monitoring on fences, anyone attempting to climb through. Pros and cons The easy tracking of objects is also possible through the camera. Algorithms make it possible to recognize alarm situations with certainty. Video sensors are heavily dependent on visibility conditions. Detection principle and specification – IR detectors can measure changes in temperature, which enables them to recognize heatradiating objects – Temperature changes in the surveillance area caused by a moving intruder are reliably recognized Surveillance area / detection – Up to 50 m for standard video cameras and approx. 80 m for infrared cameras – Many detection parameters can be set, such as speed, direction, course, size, time, and area Sector 0 Sector 1 Sector 2 Sector 3 Radar sensor Detection principle and specification – Transmitter and receiver in one device – The detection device transmits electromagnetic waves and evaluates the echo reflected by objects – Objects and people are therefore reliably recognized and both their speed and their exact location are determined Surveillance area / detection – Up to approx. 400 m of sensor cable per unit –A fence height of up to 2 m can be monitored with one cable –D igital systems: precise localization of the report to within 3 m – Analog systems: one alarm per sensor line Sector 1 Sector 2 Sector 3 Fiber-optic sensor cables Detection principle and specification – The sensor cable is attached to the fence – V ibrations on the fence caused by intruders affect the optical behavior of the fiber-optic sensor and are recognized – Analog systems measure and evaluate light intensity, while digital systems precisely locate alarms Surveillance area / detection – Up to approx. 2 × 400 m of sensor cable per processing unit – Surveillance field is approx. 2 – 3 m in height and width – Localization of the alarm is exact to within 3 m Sector 1 Sector 2 Sector 3 Pros and cons Detection depends heavily on the installation (assembly depth), and assembly in turn brings higher costs with it. The major advantage: the option of precisely defining detection areas. Surveillance area / detection – Surveillance area up to approx. 1.5 m in diameter per sensor – Up to 50 pairs of sensors can be networked with an interval of approx. 1 m and one alarm per sensor line Effectiveness: This solution is especially well suited to monitoring lines, such as long fences, solar panels, or pipelines, as well as preventing anyone from climbing over or through them or from digging them up. Pros and cons Assembly costs are high – but so are the advantages: The surveillance field follows the shape of the landscape and adjusts to it perfectly. Furthermore, the cables are in the ground and can be installed so that they are invisible. Sector 0 Effectiveness: These detection devices monitor anyone entering on foot or by vehicle and are used to monitor lines along fences and for area surveillance on rooftops and in open spaces. Pros and cons The security measure can be installed easily and quickly and offers the advantages of low cost and easy maintenance. It should be kept in mind that the system is also vulnerable to attack. Sector 0 Effectiveness: Fence sensors Effectiveness: They are used primarily to monitor fences or walls and report anyone climbing over or climbing through secured areas. Detection principle and specification – Piezoelectric or capacitive sensors installed at various points measure vibrations from intruders (structure-borne sound) and transform them into electric signals – Capacitive sensors can also be used in part to check the installation position Sector 0 Sector 1 Sector 2 Sector 3 Pros and cons The solution is cost-effective and is easy to install and maintain. Sensitivity can also be adjusted for each sensor. However, its dependence on weather conditions is a disadvantage. Detection is severely restricted when visibility is poor. Surveillance area / detection – Range: up to approx. 100 m, depending on the type – Partially divided into zones – Available as a curtain, line, or volumetric sensor Sector 0 Sector 1 Sector 2 Sector 3 Pros and cons By determining the object coordinates, a surveillance camera can be operated with pinpoint accuracy. The invisible surveillance area can be individually adjusted, which makes it difficult to outwit the sensor. Surveillance area / detection – Depending on the product, up to a radius of 800 m and height of 15 m – Exact location of an object – Universally adjustable detection areas and object properties Sector 0 Sector 1 Sector 2 Sector 3 Pros and cons This solution can be implemented over long distances and the cable can simultaneously be used by other applications, such as video, and thus reduce costs. However, cost reductions are only seen when used at distances of 8 km and greater. Surveillance area / detection – Up to 1.5 km (for analog systems) and up to 80 km (for digital systems) – Up to approx. 2 m of fence height can be monitored – Localization of the report to within exactly 25 m (digital only), zone formation is possible Sector 0 Sector 1 Sector 2 Sector 3 Pros and cons In addition to the advantages of easy installation and maintenance, sensitivity can be adjusted individually for each sensor. One weakness is the vulnerability of the system to attack. Surveillance area / detection – Up to approx. 4 m – Single-point reporting or can be grouped into segments 13 In the end, one thing matters more than anything else: perfect integration. Paths to information bundling: react quickly, maintain security. It’s good to know what holds the security world together at its innermost core. Benefit from our knowledge and perfect your perimeter security concept. We offer you diverse integration possibilities in higher-level systems that you can use to centrally administer every component of your security technology. Particularly when different security mechanisms are combined, this can lead to a security vulnerability in the monitoring of various components. Our systems merge information under a common platform and offer you an additional security factor. Straightforward, low maintenance, scalable. Siveillance SiteIQ: wide area surveillance for a complete overview of the situation on site With SiteIQ, we offer you a solution that makes it possible for you to stop attempted security breaches before they even occur. The automatic wide-area surveillance solution combines traditional perimeter surveillance using fence and other sensors with intelligent video technology. It displays security-relevant data on a monitor in real time and continuously keeps your security personnel up to date regarding all events in the surrounding area. SiteIQ can be easily adapted to site-specific operational and security conditions and can be integrated into higher-level hazard management systems and control stations. In the process, it is possible to restrict access to selected areas or to the entire site, establish different security levels within a site, and 14 upgrade or downgrade the respective security level. detection systems at the highest level Perimeter monitoring devices are usually connected to standard intrusion detection systems. Here Siemens offers a comprehensive range of products for your customized solution. Whether you work with traditional standalone intrusion detection systems – such as our Sintony devices – with the innovative new SPC product family, or with the network-compatible Transliner Ringbus technology for the highest requirements, you are always assured that reports from the perimeter system are correctly prioritized. In the intrusion detection systems, perimeter reports can be interpreted and processed similarly to conventional intrusion, theft, and accident reports. Conse- quently, the alerting of response forces is assured either directly or via our own security control center. Intrusion Professional handling of all reports from the security system makes it possible for us to send you the necessary support quickly. No matter what measures become necessary. Both immediate intervention by security forces and the coordination of support through our service technicians: everything will be reliably attended to and with the greatest care in our emergency call and service center. Security management systems for comprehensive security Only combining all reports from the individual security solutions can give you control over the system and make security assessable. For this, Siemens offers you a range of different security management systems. The advantage is that all reports are brought together on a single surface. The management systems differ in the complexity of their options and specific primary uses. Your security requirements must be brought together into a common security concept with consideration of local conditions. Just as the management system must be adapted to the given requirements. The Siveillance Fusion system from Siemens security management offers you a reliable, scalable, and userfriendly solution for centrally administer ing your access control, video surveillance, and intrusion detection technology. The multisite approach for this solution makes it possible for you to receive reports from various sites and to attend to all systems at once as if they were a single system. The GMA manager is a management station that easily attends to and manages notifications from fire detection and security systems such as your intrusion or perimeter security system, including video cameras. Highlights A variety of integration options for all components in available systems Automatic wide-area surveillance with Siveillance SiteIQ Reliable intervention through intrusion detection systems Security at a glance with comprehensive management solutions Siveillance Vantage is used primarily when critical infrastructure needs to be monitored. In addition to the display and processing options of the individual security systems, Vantage also offers you the ability to manage response teams and resources. 15