Perimeter security: because walls alone are not enough.

Transcription

Perimeter security: because walls alone are not enough.
Siemens Switzerland Ltd
Infrastructure & Cities Sector
Building Technologies Division
International Headquarters
Gubelstrasse 22
6301 Zug
Switzerland
Tel +41 41 724 24 24
The information in this document contains general descriptions of technical options available,
which do not always have to be present in individual cases. The required features should therefore
be specified in each individual case at the time of closing the contract.
Subject to modifications.
© Siemens Switzerland Ltd, 2012
Printed in Germany (03/2012).
Answers for infrastructure.
Our world is undergoing changes that force us to think
in new ways: demographic change, urbanization, global
warming, and resource shortages. Maximum efficiency
has top priority – and not only where energy is concerned.
In addition, we need to increase comfort for the well-being
of users. Also, our need for safety and security is constantly
www.siemens.de/buildingtechnologies
growing. For our customers, success is defined by how
well they manage these challenges. Siemens has the
answers.
“We are the preferred partner for energy-efficient,
safe, and secure buildings and infrastructure.”
Perimeter security: because walls
alone are not enough.
Individual security concepts and intelligent systems for your outdoor space.
Answers for infrastructure.
Every building is different.
Every one of our solutions is, too.
With a strategically thinking partner like Siemens by your side, you will benefit
from bundled expertise and values gained from many years of experience.
Prepare the groundwork for your individual perimeter security solution while
working together with us.
Good planning is the best
prevention
An extensive industrial site clearly requires different protection than a museum in a historical building. There are
good reasons why perimeter security
now has a diverse product portfolio with
intelligent technologies to offer. However, for perimeter security to perform
its most important prevention tasks, it
requires one thing above all: carefully
thought-out planning.
Perimeter security is more than
just the details.
Fences, walls, intelligent detection technology, and the latest surveillance
measures: today the options for comprehensive perimeter security around
a property are more diverse and complex than ever before. And that’s a
good thing. Whether for VIPs, airports, forensics, penal institutions, industrial
properties with high security requirements (such as logistics or chemical
companies), solar facilities, outside warehouses, or power plants, appropriate preventive measures help to preclude or minimize damage. They contribute to the early recognition of offenders and support the rapid introduction
of countermeasures as soon as danger is imminent.
All to achieve one thing:
the optimal solution for you
A wide range of different threat scenarios exist. Therefore we mark out the
premises for your individual security
objectives together with you and analyze
what makes your grounds so special.
This knowledge and our over 160 years
of experience make it possible for us to
select ideal components from the product
ranges of different manufacturers and
thus create the best integration options.
Either in your existing infrastructure or
in a completely new facility.
With you on site
Think globally, act locally. This is an important advantage, particularly in the
case of complex perimeter security: Your
personal Siemens staff member on site
will become familiar with your needs and
will be there for you during the preparation, wrap-up, and during installation. In
the process, the staff member will benefit
from the expertise and options provided
by a worldwide network of specialists.
Thus our expertise in the development
of individual security concepts also gives
you the long-term security of being in
the best hands. For optimal protection
of your investment, beyond the development and implementation of your solution we of course offer you all continuing
services necessary for the smooth operation of your security systems.
The most important factors
at a glance
Intelligent, integrated concepts for
complete perimeter security
Developing a manufacturerindependent solution that is
optimally adapted to your needs
Expertise from the security concept
to the implementation of different
technologies
A contact provides the necessary
transparency in a complex field
A broad portfolio for diverse
applications
Bringing all technologies together
in a single user interface
Integrating already existing
infrastructure
Integrated service concept and high
availability of service technicians
However, just as it is not enough to stack individual building blocks on top
of each other to form a wall, perimeter security requires a suitable “mortar”
that binds all the parts together and optimally balances them for perfect
stability. We are happy to create this connection for you. With individual security concepts that have one objective above all others: complete security.
For the entire premises.
2
3
What’s most important comes first:
thinking ahead in all directions.
What do possible threat scenarios look like? What characterizes offenders who have
targeted your company? How are your external grounds secured? As the ones who
do your advance thinking for you with regard to prevention, we completely immerse
ourselves in your company’s situation, working step by step to develop an optimally
adapted security concept for you.
Security is a feeling – and a fact. While
in a certain sense feeling secure can be
a very subjective thing, we first analyze
your actual security needs for you and use
this as a basis to develop an integrated
security concept that factors in all securityrelevant questions concerning perimeter
security. This provides you with an overview – with optimal transparency and
maximum assurance in making decisions.
At the beginning, there is
risk analysis
Every property is different and is “predestined” in its own way to vulnerabilities
from different threats and offenders.
For this reason, the first thing we do in
our analysis is to determine the types of
possible threats your building periphery
is exposed to as well as the profiles of
potential offenders or offender groups.
After site inspections and interviews, we
prepare the individual security profile
in cooperation with you. In the process,
it is worth considering that threats to a
property can emanate from two scenarios.
4
On the one hand, from targeted criminal
acts, such as sabotage, attack, hostagetaking, intrusion, burglary, or espionage.
And on the other hand, from random
criminal acts, such as vandalism or demonstrations by people prepared to use
violence. The damage to be expected
and its likelihood of occurrence determine the risk potential, which in turn can
be used to determine security objectives
and weak points.
Your security goals:
a matter of definition
Before we consider how your security
concept would appear in its ideal form,
we first need to define more precisely
the area to be protected. Depending
on the local conditions, within the
framework of the risk analysis we
define if and how the legal boundary
line is shown as well as if and how
special security measures are used
before this line. Furthermore, we clarify the best way to protect you from
intrusions, breakouts, and vandalism
or from the illicit transfer of products
or money.
All good things come in threes:
your security measures
After this preliminary work, we can derive
the additional security measures – from
the technical solution to its coordination
and connection. Generally, a property is
only well protected if the resistance time
of a mechanical security measure is equal
Overview
of security
measures
rganizational
O
and personnel
measures
Mechanical
and physical
measures
Electronic
surveillance
and detection
measures
to or greater than the reaction time the
guards need to arrive on site.
Mechanical security measures
One of the first steps in defining a security concept is devising appropriate –
and lasting – mechanical security devices. In addition to indicating the property lines, the purpose of mechanical security measures is to prevent intrusion into
the secured area or movement within
it. In many cases, naturally occurring
features – such as ditches and embankments, thorn bushes, moats, and ponds –
already provide good perimeter protection
that can be reinforced with fences, boulders, bollards, and road blocks. Nevertheless it should be taken into account that
mechanical security still needs to function
properly if weather conditions change.
Electronic monitoring
For different applications, such as fence
surveillance, detectors that secure the
ground area, or different detection devices that monitor smaller or larger spaces,
Siemens can offer you the best solutions.
Organizational measures
If anything is detected, notification will
be conveyed to the appropriate sites.
In this case, only the interventions that
have been specifically agreed upon for
the property will be initiated. Thus everything is perfectly organized.
At the end, there is the overall
concept
An overall concept includes securing both
the inside and outside of buildings and
consists of the synergistic total of individual measures to achieve the desired security objectives. Profit from our experience
and focus on an overall solution. For your
secure satisfaction.
Step by step to the security concept
Step 1: Risk analysis
Describing possible threat scenarios and perpetrator profiles,
determining risk potential and vulnerabilities.
Step 2: Security objectives
The most important security objectives are determined
depending on the local conditions, for example, indicating
the property line or protecting against vandalism.
Step 3: Security measures
The mechanical, electronic, and organizational security
measures are derived from the security objectives.
Security concept
In the end, there is the overall concept that optimally aligns
all security measures with each other.
5
An overview of the detectors
Adaptability is everything. Therefore, application-specific
sensors that have been optimally adjusted to the requirements of their respective fields of application are used to
electronically survey critical outdoor spaces and to monitor fences, boundaries, and rooftops as well as to always
keep the focus on your security.
1.
Active IR light barrier
The most important application
areas at a glance:
Our building blocks for perimeter security
6.
The most important application
areas at a glance:
Gate areas
Window fronts
Fence climb over
Using our overview graphic, we have provided you with
examples of where each perimeter security solution can
be used to best effect.
High-frequency signal cables
Open spaces between fences
Green spaces
Pathways
7.
Ground sensors
The most important application
areas at a glance:
Open spaces between fences
Green spaces
Pathways
9.
1.
10.
3.
2.
Microwave detectors
The most important application
areas at a glance:
Area between fences (“sterile” zones)
Rooftop areas
3.
The most important application
areas at a glance:
8.
8.
Laser scanners
Rooftop areas
Facades
Fence climb over
IR motion detectors
The most important application
areas at a glance:
7.
6.
Smaller open spaces
Dedicated areas next to fences
Pathways
9.
Radar sensor
The most important application
areas at a glance:
Large, flat open spaces
4.
5.
4.
Video sensors
The most important application
areas at a glance:
Open spaces
Areas near fences
Rooftop areas
5.
10.
Microphone sensor cables
The most important application
areas at a glance:
The most important application
areas at a glance:
Conventional fences
2.
6
Fiber-optic sensor cables
Long fences
Long properties in the ground
(pipelines, cable lines)
11.
Fence sensors
The most important application
areas at a glance:
Individual fence panels
Fences with different structural
forms
11.
9
Four sectors for comprehensive security.
Your property can be threatened from every direction. Therefore, dividing your
perimeter into clearly structured sectors helps to determine various security measures that make it possible to prepare rapidly and securely for any scenario.
Sensitive sensors – reliable detection.
Different security objectives demand different sensors. As a result, the following
criteria should be considered when deciding on electronic detection measures:
– Reliability of detection
– Number of unwanted notifications
– Deception possibilities
– Security against tampering
– Security against transmission
Active IR light barriers
– Interfaces with other subsystems
– Installation option
– Service-friendliness
– Visibility
Effectiveness:
Light barriers are suitable for monitoring lines
along fences and gates and for curtain monitoring of properties, windows, and walls. This monitors any persons or vehicles entering the property while also monitoring passage and access.
Detection principle and specification
– Systems consist of transmitter and receivers
with one or more light beams
– Monitor the light beam for interruption and
manipulation by extraneous light
– Any interruption of the light beam by intruders
will be reliably recognized
Microwave detectors
Effectiveness:
They are used to monitor lines along
fences, on rooftops, and over large areas and
report anyone who walks into or drives through
the surveillance area.
Sector 0
Perimeter security areas
Monitored perimeter areas are divided
into four sectors so you can find the optimal orientation and plan. Both mechanical and electronic measures can be allocated according to your security objective.
Sector 0
A single, specific strip of ground that lies
outside the perimeter area to be protected. In this sector, it is possible to hinder
and detect an unauthorized approach.
10
Sector 1
Sector 1
A closed boundary line along the perimeter area that may be defined, for
example, by a fence, wall, or moat, and
that prevents or detects crossing into
this sector.
Sector 2
The entire area within the perimeter without buildings or facilities to be protected.
Entry into this sector or movement within
it should be hindered or detected.
Sector 2
Detection principle and specification
– The sensor consists of separate transmitting
and receiving units and creates a volumetric
electromagnetic field between them
– Changes to the field due to absorption or
reflection of objects or people in the detection
area are consistently recognized
Sector 3
Sector 3
A space within sector 2 that encompasses
the buildings or facilities requiring protection. A possible surveillance objective
may be to detect anyone who is entering,
climbing, or damaging such buildings or
to prevent these from happening.
Using the color-mapping of the individual
sectors, it is possible to see the respective
effectiveness in the corresponding areas
in the following overview.
Laser scanner
Effectiveness:
Sector 0
Sector 1
Sector 2
Sector 3
Pros and cons
Good monitoring of linear stretches. The monitoring height can be flexibly varied by individually configuring the columns. Limited functionality
in the event of poor visibility
(monitoring approx. 1.5 m × visibility range).
Surveillance area / detection
– Up to approx. 100 m range, height: 0.5 to 5 m
– Good detection rate, few false alarms
– Beams per column: 2 to 16
– It is not possible to locate an object precisely
within the zone
Sector 0
Sector 1
Sector 2
Sector 3
Pros and cons
Due to its high sensitivity, this solution enables
good detection under almost any weather conditions at a height of up to 15 m.
However, it is less suitable when narrow
detection zones of less than 2 m are required.
Surveillance area / detection
– Height/width of field depending on type and
distance up to a maximum of 500 m
– Large overlaps of detection fields are necessary
if larger distances with multiple sensors in a
row are monitored
Sector 0
Sector 1
Sector 2
Sector 3
They serve as curtain sensors for properties or
penetration detectors for walls and larger flat,
open spaces (for example, zones between two
fences) and monitor possible access as well as
anyone walking or driving into the area.
Pros and cons
This first-rate solution proves itself through its
significantly low false-alarm rate and can be
installed easily in all areas. Additionally, it offers
the option of concealed mounting.
Detection principle and specification
– They scan the surrounding area in two dimensions with laser beams
– Objects and people are detected
using time-of-flight measurement of the
reflected light, and their size, distance, and
speed with regard to the sensor are determined
Surveillance area / detection
– Range of approx. 100 m, scanning angle of
max. 270°
– Exact localization of an object, universally adjustable detection areas and object properties,
multiple alarm zones that can be adjusted with
different parameters
11
Video sensors
Effectiveness:
Video sensors are used to automatically detect
people or objects who are within the viewing
range of a video camera.
Detection principle and specification
–T
he video sensors use algorithms to define
objects that should be recognized or followed
in the video image
– In the video image, the algorithms recognize
objects and people who move within a camera’s viewing range
Microphone sensor cables
Effectiveness:
Monitors manipulation, such as cutting through
or climbing over fences (for example, chain-link
or lattice fences).
Detection principle
– The sensor cable is attached to the fence
–T
he slightest vibrations of the fence influence
the cable’s electrical behavior
–V
ibrations on the fence caused by intruders are
immediately recognized and analyzed
– In contrast to analog systems, digital systems
can precisely localize alarms using time-offlight measurement
High-frequency signal cables
Effectiveness:
They report any persons or vehicles that enter
the property and are ideally suited to area surveillance of open spaces and paths or for monitoring uneven ground or areas under trees.
Detection principle and specification
– Invisible HF field between two concealed
sensor cables buried in the ground
– Changes to the field caused by intruders are
recognized and evaluated
Ground sensors
Effectiveness:
Pressure-change systems react to any persons or
vehicles entering the property and are ideal for
area surveillance of open spaces and paths or of
uneven ground.
Detection principle and specification
– Concealed individual sensors are networked
with each other
– They work dynamically and transform changes
in pressure into electrical signals via piezo
elements
– Changes to the field caused by intruders are
recognized and evaluated
12
Sector 0
Sector 1
Sector 2
Sector 3
IR motion detectors
They report anyone entering large areas on foot
or by vehicle or, in the case of curtain monitoring
on fences, anyone attempting to climb through.
Pros and cons
The easy tracking of objects is also possible
through the camera. Algorithms make it possible
to recognize alarm situations with certainty.
Video sensors are heavily dependent on visibility
conditions.
Detection principle and specification
– IR detectors can measure changes in temperature, which enables them to recognize heatradiating objects
– Temperature changes in the surveillance
area caused by a moving intruder are reliably
recognized
Surveillance area / detection
– Up to 50 m for standard video cameras and
approx. 80 m for infrared cameras
– Many detection parameters can be set, such as
speed, direction, course, size, time, and area
Sector 0
Sector 1
Sector 2
Sector 3
Radar sensor
Detection principle and specification
– Transmitter and receiver in one device
– The detection device transmits electromagnetic
waves and evaluates the echo reflected by
objects
– Objects and people are therefore reliably recognized and both their speed and their exact
location are determined
Surveillance area / detection
– Up to approx. 400 m of sensor cable per unit
–A
fence height of up to 2 m can be monitored
with one cable
–D
igital systems: precise localization of the
report to within 3 m
– Analog systems: one alarm per sensor line
Sector 1
Sector 2
Sector 3
Fiber-optic sensor cables
Detection principle and specification
– The sensor cable is attached to the fence
– V ibrations on the fence caused by intruders
affect the optical behavior of the fiber-optic
sensor and are recognized
– Analog systems measure and evaluate light
intensity, while digital systems precisely locate
alarms
Surveillance area / detection
– Up to approx. 2 × 400 m of sensor cable per
processing unit
– Surveillance field is approx. 2 – 3 m in height
and width
– Localization of the alarm is exact to within 3 m
Sector 1
Sector 2
Sector 3
Pros and cons
Detection depends heavily on the installation
(assembly depth), and assembly in turn brings
higher costs with it. The major advantage: the
option of precisely defining detection areas.
Surveillance area / detection
– Surveillance area up to approx. 1.5 m in diameter per sensor
– Up to 50 pairs of sensors can be networked
with an interval of approx. 1 m and one alarm
per sensor line
Effectiveness:
This solution is especially well suited to monitoring
lines, such as long fences, solar panels, or pipelines, as well as preventing anyone from climbing
over or through them or from digging them up.
Pros and cons
Assembly costs are high – but so are the advantages: The surveillance field follows the shape of
the landscape and adjusts to it perfectly. Furthermore, the cables are in the ground and can be
installed so that they are invisible.
Sector 0
Effectiveness:
These detection devices monitor anyone entering
on foot or by vehicle and are used to monitor
lines along fences and for area surveillance on
rooftops and in open spaces.
Pros and cons
The security measure can be installed easily and
quickly and offers the advantages of low cost and
easy maintenance. It should be kept in mind that
the system is also vulnerable to attack.
Sector 0
Effectiveness:
Fence sensors
Effectiveness:
They are used primarily to monitor fences or
walls and report anyone climbing over or climbing through secured areas.
Detection principle and specification
– Piezoelectric or capacitive sensors installed at
various points measure vibrations from intruders (structure-borne sound) and transform
them into electric signals
– Capacitive sensors can also be used in part to
check the installation position
Sector 0
Sector 1
Sector 2
Sector 3
Pros and cons
The solution is cost-effective and is easy to install
and maintain. Sensitivity can also be adjusted
for each sensor. However, its dependence on
weather conditions is a disadvantage. Detection
is severely restricted when visibility is poor.
Surveillance area / detection
– Range: up to approx. 100 m, depending on
the type
– Partially divided into zones
– Available as a curtain, line, or volumetric
sensor
Sector 0
Sector 1
Sector 2
Sector 3
Pros and cons
By determining the object coordinates, a surveillance camera can be operated with pinpoint
accuracy. The invisible surveillance area can be
individually adjusted, which makes it difficult
to outwit the sensor.
Surveillance area / detection
– Depending on the product, up to a radius of
800 m and height of 15 m
– Exact location of an object
– Universally adjustable detection areas and
object properties
Sector 0
Sector 1
Sector 2
Sector 3
Pros and cons
This solution can be implemented over long distances and the cable can simultaneously be used
by other applications, such as video, and thus
reduce costs. However, cost reductions are only
seen when used at distances of 8 km and greater.
Surveillance area / detection
– Up to 1.5 km (for analog systems) and up to
80 km (for digital systems)
– Up to approx. 2 m of fence height can be monitored
– Localization of the report to within exactly
25 m (digital only), zone formation is possible
Sector 0
Sector 1
Sector 2
Sector 3
Pros and cons
In addition to the advantages of easy installation
and maintenance, sensitivity can be adjusted
individually for each sensor. One weakness is the
vulnerability of the system to attack.
Surveillance area / detection
– Up to approx. 4 m
– Single-point reporting or can be grouped into
segments
13
In the end, one thing matters more than
anything else: perfect integration.
Paths to information bundling:
react quickly, maintain security.
It’s good to know what holds the security world together at its innermost core. Benefit from our knowledge and perfect your perimeter security concept. We offer you
diverse integration possibilities in higher-level systems that you can use to centrally
administer every component of your security technology.
Particularly when different security mechanisms are combined, this can lead to a
security vulnerability in the monitoring of various components. Our systems merge
information under a common platform and offer you an additional security factor.
Straightforward, low maintenance, scalable.
Siveillance
SiteIQ: wide area
surveillance for a complete
overview of the situation on site
With SiteIQ, we offer you a solution that
makes it possible for you to stop attempted security breaches before they
even occur. The automatic wide-area
surveillance solution combines traditional
perimeter surveillance using fence and
other sensors with intelligent video technology. It displays security-relevant data
on a monitor in real time and continuously keeps your security personnel up to
date regarding all events in the surrounding area. SiteIQ can be easily adapted
to site-specific operational and security
conditions and can be integrated into
higher-level hazard management systems
and control stations. In the process, it
is possible to restrict access to selected
areas or to the entire site, establish different security levels within a site, and
14
upgrade or downgrade the respective
security level.
detection systems at the
highest level
Perimeter monitoring devices are usually
connected to standard intrusion detection systems. Here Siemens offers a comprehensive range of products for your
customized solution.
Whether you work with traditional standalone intrusion detection systems – such
as our Sintony devices – with the innovative new SPC product family, or with the
network-compatible Transliner Ringbus
technology for the highest requirements,
you are always assured that reports from
the perimeter system are correctly prioritized. In the intrusion detection systems,
perimeter reports can be interpreted and
processed similarly to conventional intrusion, theft, and accident reports. Conse-
quently, the alerting of response forces
is assured either directly or via our own
security control center.
Intrusion
Professional handling of all reports from
the security system makes it possible
for us to send you the necessary support quickly. No matter what measures
become necessary. Both immediate intervention by security forces and the coordination of support through our service
technicians: everything will be reliably
attended to and with the greatest care
in our emergency call and service center.
Security
management systems for
comprehensive security
Only combining all reports from the
individual security solutions can give you
control over the system and make security assessable. For this, Siemens offers
you a range of different security management systems.
The advantage is that all reports are
brought together on a single surface.
The management systems differ in the
complexity of their options and specific
primary uses. Your security requirements
must be brought together into a common
security concept with consideration of
local conditions. Just as the management
system must be adapted to the given
requirements. The Siveillance Fusion system from Siemens security management
offers you a reliable, scalable, and userfriendly solution for centrally administer
ing your access control, video surveillance, and intrusion detection technology. The multisite approach for this solution makes it possible for you to receive
reports from various sites and to attend
to all systems at once as if they were a
single system.
The GMA manager is a management station that easily attends to and manages
notifications from fire detection and
security systems such as your intrusion
or perimeter security system, including
video cameras.
Highlights
A variety
of integration options for
all components in available systems
Automatic
wide-area surveillance
with Siveillance SiteIQ
Reliable
intervention through intrusion detection systems
Security
at a glance with comprehensive management solutions
Siveillance Vantage is used primarily
when critical infrastructure needs to be
monitored. In addition to the display
and processing options of the individual
security systems, Vantage also offers you
the ability to manage response teams
and resources.
15