Webinar | The Truth About Fence Detection Sensors

02 Dec.,2024

 

Webinar | The Truth About Fence Detection Sensors

Outdoor perimeter security is a facility&#;s first line of defense against attack, sabotage, property theft or harm to personnel. Selecting the right detection solution is vital to protecting your critical infrastructure and assets. With so many fence sensors in the marketplace, comparing the available options can be a daunting task. How can you identify the most appropriate solution for your application, and what factors are critical to consider during this decision-making process?

If you are looking for more details, kindly visit Raycom.

This 60-minute webinar will explore common fence sensor types, highlight key installation, maintenance and performance considerations and debunk common misconceptions about fence detection technologies &#; arming you with the tools to make an informed decision when specifying or purchasing a detection system.

  • UNDERSTAND the capabilities of different fence detection sensors in today&#;s marketplace
  • IDENTIFY sensor performance criteria that ensures high probability of detection and a low nuisance alarm rates
  • DISCOVER the realities behind common fence sensor myths

 

This session offers an ideal learning opportunity for end users, consultants, architects, engineers and security systems integrators involved in the specification, design and procurement of outdoor electronic fence detection sensors for perimeter protection.

Perimeter Detection Basics & Solutions

Perimeter Detection Basics & Solutions

perimeter intrusion detection system Considerations

Detection of a potential or confirmed breach of the property perimeter provides time for police or guard forces to intercept a threat before the loss of property or harm to staff.  Facilities with perimeter detection in place range from remote petrochemical or cellular sites to vehicle processing or storage facilities to critical infrastructure.

There are many things to consider when evaluating your current or new perimeter detection strategy.

Early warning detection and assessment

Continuous line of detection

Delaying intruder access

Response force reaction time

Threat analysis

Risk assessment

Single layer protection

Dual layer protection

Multi-layer protection

 

 

    

 

 

KEY PRINCIPLES OF AN EFFECTIVE PERIMETER SECURITY PROGRAM

Deter: A fortified site is the optimal deterrent to attackers. Commonly, perimeter fences / barriers, plus other visible mechanisms such as perimeter intrusion detection systems (PIDS), lighting and cameras serve as deterrents to a would-be attacker.

Detect: Implementation of detection sensors enhance the ability to identify intruders and stave off an attack. It is recommended to introduce at minimum a single layer of PIDS technology to detect intruders at the outer perimeter. Often, a dual-layer approach is called for to protect a facility with higher security requirements (i.e. potential theft or damage to higher value assets). Layering complementary technologies, such as fence sensors plus video analytics, allows reinforcement of the perimeter layer. For the highest security applications (i.e. where threat to critical infrastructure or human life is present), a multi-layered system incorporating a range of technologies further adds to the level of protection.

Delay: It&#;s critical to maximize the time span from ingress to attackable asset, to allow the security team time to respond. Physical barriers at the perimeter, PIDS on and inside the perimeter fence, internal barriers (ideally with PIDS), and the distance between barriers and attackable asset are all delay mechanisms that slow an attacker.

Assess: Introduce an integrated system that includes alarm communication and CCTV/Video assessment of intrusions. Operators need to see what the system has detected.

Respond: Design scenarios and deployment of your response force to stop a threat / attack or intruder. 

 

Intelligent System Characteristics

Key components of an intelligent perimeter detection system:

Detection

Location

Adaptability

Zones & Cameras

Discrimination

Power & Data

Maintenance

Integration

 

 

 

Design Considerations

Access Considerations

Authorized Access

Unauthorized Access

Site Security Level Considerations

Detection Criteria

Deployment Examples 

 

 

        

 

Rigid and Decorative Fence Considerations

When deciding that it's time to add fence protection to a rigid or decorative fence, end users often think they have limited options. In the video below, Steve Pennington and Jeff Drews discuss strategies and solutions for these types of applications. Then, Brad Castillo and Tim Claus help Jeff test a rigid fence intrusion detection solution.

During the video, we get some excellent advice about fence intrusion detection system testing:

The cut simulator tool mimics an intruder using bolt-cutters, and an actual climber is the only accurate method to conduct a climb test.

Testing the fence must be done from the outside (unsecured side) of the fence or it&#;s not a real test. Many times, customers with rigid fences will complain that they are getting nuisance alarms and are also having difficulty detecting a climber. In nearly every case, we&#;ve found that they are testing from the inside (secure side) of the fence. 

 

    

 

Security Camera Field of View Related to Zone Detection Distances

Creating short fence or buried cable detection zones increases your ability to identify a threat by using your video surveillance system more effectively.

Plus, the DORI concept is particularly critical for protecting perimeters. Be sure to consider your viewing expectations in terms of Detection, Observation, Recognition, Identifiation (DORI). More details on DORI here.

 

 

        

 

Lightning and Surge Protection

There's understandable concern in the security industry when it comes to protecting equipment from lightning and other power surges. And putting cables along a metal fence around an entire perimeter just adds to the complexity level. In the video below, Tom Fontana and Tim Claus discuss the threat of power surge and how systems can be designed to minimize the risk.

 

    

 

Integration Options for Perimeter Detection

Common ways to integrate 3rd party systems like video management and access control with perimeter detection systems includes the use of contact closures and programming using a Software Development Kit (SDK) .

 

 

        

 

Fence Sensor Cable Repair

There can be significant risk involved when a fence intrusion detection system is compromised by a broken or damaged sensor cable. Joe Barnhart and Tim Claus walk us through a cable splice in this video.

Worth noting:

It takes less than 15 minutes, minimal training, and only a couple common tools to repair damage to a copper-based fence intrusion detection sensor cable in most cases.

 

    

 

Stacked Microwave Detection Strategies

Using microwave detection to secure a perimeter is a strategy commonly used when a fence isn't an option or when multiple layers of security are required. Below, Tom Fontana and Tim Claus discuss the use of multiple microwave detection sensors and the technology involved that makes these strategies possible.

Helpful hints: 

The beam width and shape is fully dependent upon distance between the Tx and Rx devices and the flatness of the terrain between them.

The goal is to achieve the highest possible alignment signal and use the lowest possible sensitivity setting. In most cases, customers will attain a basic alignment and then turn up sensitivity to compensate. This will cause poor performance and high NAR/FAR.

Adjusting sensitivity is time consuming, plan for this during installation.

 

    

 

Armored Fence Sensor Cable Applications

To minimize the risk of suffering damage to a fence intrusion detection sensor cable, the use of armored cable is sometimes the best option. In this video, Tom Fontana and Tim Claus discuss the use of armored sensor cables and show us the difference.

In this video, we learn two primary applications for using armored cable:

Rigid fence &#; armored sensor cable has an enhanced ability to mute high frequency vibrations on rigid fencing and nuisance alarm filtering in this application. 

High traffic areas &#; if the fence is next to a high traffic pedestrian area, then it may make sense to use armored cable. That way, if people are regularly handling or tampering with the cable, it doesn&#;t damage the actual sensor.

 

    

 

 

Site Survey

A site survey is necessary in order to properly evaluate the perimeter. Below is a link to Site Survey: Perimeter Detection to get you started down the path to an effective perimeter detection solution. The site survey will provide an opportunity for all stakeholders to set their expectations and will narrow down the best solution for the application. 

 

 

     

 

 

 

 

    

 

 

 

Perimeter Detection Technologies

Various technologies can be used to detect organized motion, shock, vibration, and heat signature. These technologies include thermal imaging cameras, buried cable, fence mounted cable, infrared beam, stereo Doppler microwave, and radar in military or airport applications.

 

 

 

   

 

The company is the world’s best RF970 fiber optic fence sensor system supplier. We are your one-stop shop for all needs. Our staff are highly-specialized and will help you find the product you need.

    

 

Thermal Imaging

Thermal imaging cameras provide the opportunity to detect a human or other heat signature producing body at or before a perimeter. This technology allows monitoring stations to eliminate the possibility of cloaking by using shrubbery or camouflage clothing. Cameras that can see visible light are often used to verify a heat signature detected by a thermal camera since the resolution of a thermal imager is much lower than that of today&#;s high definition visible imagers. In many cases, lights will be turned on at the alarm site. Another option to provide light for the visible camera imager is to utilize infrared illumination which allows the camera to see a monochrome image of the scene with no visible light present.

Thermal imaging cameras are available in many form factors.  Most often a fixed camera is used, however, there are high end solutions which allow for pan tile zoom functionality.  At the highest end of the camera capability range are thermal cameras with a second visible light sensor.  This allows the operator to quickly switch between the thermal image and the visible image to quickly identify the potential threat.

          

 

 

 

Intelligent video analytics (IVA) are often deployed in conjunction with thermal camera sensors.  The use of IVA allows for the facility owner to determine more specifically when a violation is occurring since the image from the sensor is not as detailed as that of a visible camera imager.

 

Fence Detection Systems

 

A fence detection system is used to detect cut or climb attempts by intruders attempting to gain site access. The detection cable, which is easily affixed to fence fabric or wire topper using cable ties, is connected to a processor module that analyzes vibration activity on the cable. A properly functioning fence detection system should alarm on intrusion attempts, but ignore environmental disturbances.

To ensure high probability of detection (Pd) and a low nuisance alarm rate (NAR), choose a fence detection system that may be calibrated in software on installation to account for variations in fence fabric or tension to ensure uniform detection sensitivity along the protected fence line. The system should also employ advanced digital signal processing capabilities that differentiate fence cut / climb attacks from harmless disturbances such as wind, rain or vehicle traffic, to successfully detect intrusions while preventing the nuisance alarms that plague other technologies. Insist on a system that precisely locates intrusion attempts to within 3m (10 ft) and that features software-controlled detection zone assignment (Free-Format Zoning&#;) to keep hardware costs low and maximize flexibility as needs change.

Unique Fence Sensor Applications 

Razor Wire - within the razor coil on top of a fence or wall

Pipeline - applied to the outside of various types of pipelines to detect cutting, banging, and other disturbances

Train Tracks - even if your facility perimeter fence is alongside a train track, you can still use a fence detection system when it's deployed properly

 

 

 

 More about fence detection systems here

 

Buried Cable Detection Systems

 

A buried cable detection system provides volumetric (RF-based) detection of walking, running or crawling intruders. Designed for applications where covert protection is essential, cables are buried on the secure side of an existing physical barrier to prevent detection of animals or patrol officers, outside the barrier as an &#;early warning&#; mechanism, or in place of a barrier if esthetics are of concern. RF energy couples between Tx and Rx cables to create an invisible RF-based detection field.

When evaluating buried technologies, select a system that requires minimal trenching for cable installation and no special ground preparation or graded cables that could result in increased cost or service time. Identify a system that may be calibrated in software on installation to properly address variations in ground composition or site conditions and achieve uniform detection along the protected area. Ensure that the system offers flexible, software-controlled detection zone assignment to cost-effectively address your site&#;s unique requirements, to successfully detect intrusions while preventing the nuisance alarms that plague other technologies. Most critically, look for advanced Digital Signal Processing capabilities that enable precise location of intruders to within 3m (10ft) but prevent harmless disturbances caused by small animals or environmental factors such as wind, rain or snow.

 

 

 

More about buried cable here

 

Microwave Sensors

 

Microwave sensors, also known as Radar, RF or Doppler sensors, detect walking, running or crawling human targets in an outdoor environment. 

Microwave sensors generate an electromagnetic (RF) field between transmitter and receiver, creating an invisible volumetric detection zone. When an intruder enters the detection zone, changes to the field are registered and an alarm occurs.

Microwave sensors are often easy to install, provide high probability of detection, low nuisance alarms and resistance to rain, fog, wind, dust, falling snow and temperature extremes. Most operate at K-Band frequency, maximizing detection performance and minimizing interference from external radar sources.

More about microwave sensors here

 

Video Analytics

Camera systems can be deployed that use the information they "see" to alert authorities of very specific behavior violations such as line crossing in a specific direction as well as dozens of additional behaviors.

In the video below, we discuss the use video analytics and other systems to detect an intrusion into a secure area during a partner demonstration.

 

 

 

 

Active/Passive Infrared Sensors

 

Active infrared technology employs a two-column sensor for detection of intruders. The transmitter unit emits invisible active infrared beams. The receiver unit receives and analyses the beams and detects intruders passing between the two columns.

With passive infrared technology, intrusions are detected by sensing temperature (heat radiation) contrast between an intruder moving through the detection pattern and the background environment. Rugged construction, integrated heaters and self-adapting technology assure the reliable operation and constant detection capacity under changing environmental conditions or temperature extremes.

More on active infrared here

 

Dual Technology Motion Sensors

Dual technology motion sensors offer the unique combination of Doppler Microwave and passive infrared technology to provide volumetric protection for a variety of outdoor applications.

These sensors are configured for &#;And Gate&#; operation; both technology elements must activate simultaneously for the sensor to alarm. The microwave portion must detect motion of an intruder, while the passive infrared portion must detect infrared (heat) radiation emitted by an intruder.

Dual technology sensors feature a 15 m x 12 m (50 ft x 40 ft) detection pattern, and are specified for the protection of specific assets, strategic areas or as a gap-filler in conjunction with other detection systems such as fence or buried cable perimeter intrusion detection system, microwave links, or transceivers.

More about dual-technology motion detection here

 

Senstar Recognized as One of Top Five Perimeter Intrusion Brands

RAMAT GAN, Israel, July 13, /PRNewswire/ -- Senstar Technologies (NASDAQ: SNT), a world leader in video management and perimeter intrusion detection solutions, today announced that the Senstar brand has been named one of the top five perimeter intrusion brands according to a reader survey conducted by asmag.com earlier this year.

Senstar_Technologies_Logo

"As the only company on the Top 5 list that is not a camera manufacturer and with a broad range of security technologies, Senstar is proud to be recognized by the industry as a trusted company in perimeter protection," said Senstar Managing Director Fabien Haubert.

Senstar's perimeter-focused integrated technologies cover a wide range of solutions such as a fence, buried and above-ground sensors, and a modular common operating platform encompassing video and security management, video analytics, and access control. Recently, Senstar introduced a groundbreaking technology, the sensor fusion engine, as part of this platform.

Asmag.com surveyed its readers about the perimeter intrusion detection brands of their choice, features that played a significant role in decision-making, and services that need improvement. Senstar was cited as "an established industry name in perimeter intrusion detection products," offering integrated technologies for multi-layered perimeter protection.

The complete article is available at Top 5 perimeter intrusion brands: asmag.com reader survey.

"The purpose of the survey was to identify the brands that are 'top of mind' for the security industry and the features they value the most," said Emily Lin, Editor-in-Chief of asmag.com. "For this, we reached out to our readers, mostly based in Asia, who represent the security distribution channel from distributors and resellers to integrators. The survey reveals that the line between brands and product groups is fading. Decades ago, a company might have been limited to a field like surveillance or intrusion detection. But today, companies can combine different technologies for a diverse solution portfolio to address key security requirements. Channel players place detection accuracy as a top priority and want to integrate their intrusion detection systems with VMS and analytics. They look forward to using artificial intelligence to increase accuracy and reduce false alarms."

 

Senstar Corporation, a wholly-owned subsidiary of Senstar Technologies, is a leader in the security industry, providing multiple security solutions for various verticals such as PIDS, VMS, and EAC-Analytics. Senstar's products have been protecting critical assets worldwide for over 40 years. Key to the company's longevity and success is the ability to deliver leading-edge security and risk management solutions backed by deep industry knowledge and world-class support.

About Senstar Technologies Ltd.

With innovative perimeter intrusion detection systems (including fence, buried, and above ground sensors), intelligent video-management, video analytics, and access control, Senstar offers a comprehensive suite of proven, integrated solutions that reduce complexity and improve performance and unify support. For 40 years, Senstar has been safeguarding people, places, and property for organizations around the world, with a special focus on utilities, logistics, corrections, and energy markets.

 

Forward Looking Statements

This press release contains forward-looking statements, which are subject to risks and uncertainties. Such statements are based on assumptions and expectations which may not be realized and are inherently subject to risks and uncertainties, many of which cannot be predicted with accuracy and some of which might not even be anticipated. Future events and actual results, financial and otherwise, may differ from the results discussed in the forward-looking statements. A number of these risks and other factors that might cause differences, some of which could be material, along with additional discussion of forward-looking statements, are set forth in the Company's Annual Report on Form 20-F filed with the Securities and Exchange Commission. In addition, there is uncertainty about the impact of the spread of the COVID19 virus and its effect on the Company's operations, the demand for Company's products, global supply chains and economic activity in general.

 

SOURCE Magal Security Systems Ltd

As far as securing an area goes, fences are a great foundation. They create the first line of defense and a powerful visual deterrent for criminals looking to go where they&#;re not supposed to be. But they&#;re not infallible. Fences can be climbed, cut, torn down, or tunneled under. You can fortify them with stronger steel, make them higher, or add barbed wire, but they still might fail you one day. And unless you immediately know when someone has breached that perimeter, a fence is hardly more than a decoration. Fences need a little help, and a perimeter intrusion detection system can fill that role. But what is a perimeter intrusion detection system? And how does it protect you?

What is a Perimeter Intrusion Detection System?

As the name suggests, a perimeter intrusion detection system&#;aka PIDS&#;is a system of sensors that detects an intruder whenever a fence or wall is climbed, cut, or otherwise disturbed. It provides a failsafe for what is already a decent obstacle.

Proper perimeter protection should use the 5 &#;D&#;s of perimeter security, starting with the outermost boundary and working in:

Deter (the presence of fences and other barriers)

Detect (PIDS and security cameras to alert you to unauthorized access and intrusion)

Deny (access control, security checkpoints, etc.)

Delay (locked doors and other physical barriers, security cameras for situational awareness)

Defend (security personnel or police)

Perimeter intrusion sensors provide better protection than fences and barriers alone. Along with a comprehensive security system, a PIDS is typically deployed around a high-security environment. The most common spots are prisons, military bases, airports, and government buildings. And, increasingly, around businesses, residential properties, and more.

A perimeter alarm system can range from low- to high-tech. For a simple analog example, picture a tripwire attached to a bell. A more advanced solution would be something like the seismic sensors that detect vibrations of the earth. No matter the type, they alert you to intruders breaching your outer perimeter before they have a chance to tackle your inner perimeter (doors, windows, and so on). Think of it as an early alert system that gives you time to intervene, call authorities, strengthen inner defenses, and so on.

The U.S. Army divides PIDS technology into several different categories. But let&#;s dig in a little deeper.

Types of Perimeter Security Systems

The end goal is the same, but PIDS can take one of several different forms:

Break wire

Taut wire

Active IR

Passive IR

Near-IR beam break

Electrostatic field

Magnetic

Microwave

Ported coaxial cable

Ground motion

Seismic

Fence detection (including microphonic cable and accelerometer)

Most PIDS are barrier-mounted, attached to a fence or wall, while some are ground-based or below-ground (these do not require a physical barrier). What works best depends on your location and specific needs.

Next, let&#;s examine a few of the most common and practical perimeter intrusion detection systems.

Security cameras on the property&#;s perimeter&#;either motion-activated or live streaming&#;are an affordable and user-friendly PIDS. These allow owners, site supervisors, security personnel, or any other stakeholder to keep a watchful eye on the outer boundary.

To be effective, a security camera system needs live video monitoring.

 

Motion-Activated Floodlights

Another great low-cost solution, motion-activated floodlights eliminate the cover of darkness, increase the risk of getting caught, and grab attention when flicking on in the middle of the night. They leave nothing hidden.

As you&#;d expect, would-be intruders want nothing to do with them.

Electrified Fences

Not the most subtle option, an electrified fence delivers a non-lethal shock to anyone that touches it. What&#;s more, it can trigger an alarm when it administers that shock or if the fence is cut or disturbed.

This option might be too intensive for open-to-the-public businesses and residential properties that want to welcome guests during parts of the day. So choose wisely.

Passive Infrared Sensors

Passive infrared (PIR) sensors detect motion along a perimeter. They measure the infrared light&#;heat energy in the form of electromagnetic radiation&#;coming from objects within their field of view.

Any change is interpreted as a movement by a person or animal, triggering an alarm. PIR sensors have an effective range of roughly 10 meters and may produce false alarms because of natural temperature changes.

Active Infrared Sensors

These sensors require at least one transmitter and one receiver. The transmitter shoots out an invisible beam of infrared light aimed at the receiver. If nothing is in the way, the receiver &#;sees&#; the beam. However, if a person walks through or stands between them, they interrupt the beam and trigger an alarm. Many homeowners have a similar setup on their home garage door to prevent it from closing when something is in the way.

Obviously, you need clean and direct sightlines between the components for the system to operate in the first place. These sensors are susceptible to false alarms from animals, heavy fog, and the like. AIR sensors have a range of up to 200 meters.

Microwave Sensors

Microwaves are yet another type of electromagnetic radiation with shorter wavelengths than radio waves, hence the &#;micro-&#; prefix.

These waves use radiolocation, which is similar to the echolocation used by bats and dolphins. An emitter sends microwaves out, they bounce back off objects in the area, and they are then interpreted by a receiver. In this way, they can detect not only movement but direction and speed as well via the Doppler effect.

Compared to infrared sensors, they&#;re more expensive and more prone to false alarms. But they&#;re capable of covering a larger area and are not susceptible to weather conditions.

Vibration Sensors

Simple and straightforward, vibration sensors detect and report vibrations outside of an acceptable range. Someone cutting, climbing, lifting, or shaking a fence will create vibrations. So, too, will someone trying to force their way in through a door or window.

Once a vibration meets the preset threshold, an alarm triggers. Vibration sensors can precisely locate an intruder.

Fiber Optic Cable

Used on a fence or buried underground, fiber optic cable is a precise perimeter intrusion detection system. Typically employing vibration as the detection technique, fiber optic cable provides long-range coverage&#;up to 100 km per processing unit&#;with zero gaps.

The RaySense system, for example, measures the &#;Rayleigh backscatter noise signature in a fiber optic cable as pulsed light is sent into the fiber.&#; In doing so, it can detect vibrations along the entire length of the cable and differentiate between a breach, cut, climb, or non-threatening intruder such as a squirrel.

Microphonic Cable

Installed along the length of a metal perimeter fence, a microphonic cable detection system analyzes noise patterns to identify an attempted intrusion. The Micalert system from RBtec, for example, has a maximum length of feet per processor. It boasts fast plug-and-play installation.

Precise calibration and system sensitivity are important for this PIDS to operate properly. A self-calibrating system is ideal.

Laser Tripwire/Fence

 

As you may already know, a laser&#;which stands for light amplification by stimulated emission radiation&#;is an artificially created beam of light. The light waves travel in phases&#;peaks and valleys lined up&#;which allows them to stay very narrow, focused, and bright. The beam can also travel great distances without scattering.

Similar to the infrared perimeter intrusion detection system, a laser perimeter alarm consists of two components: a transmitter that emits a continuous laser beam and a receiver. As long as there is a clear line of sight, the distance between them is irrelevant. Anything passing between them will break the beam and trigger the alarm.

Seismic Detectors

Though you might associate these sensors with their traditional use in tracking earthquakes, seismic detectors are becoming increasingly popular in both home and business security.

Consisting of multiple sensors buried underground and a processor, a seismic perimeter alarm system can detect footsteps and vehicles atop the protected area. The processor analyzes the acoustic signature of the event to identify an individual walking or a vehicle driving over the sensors and triggers an alarm based on your settings.

And because no barrier is required and the system is underground, it is virtually undetectable to the unsuspecting intruder.

The Deep Sentinel Solution

These PIDS options offer powerful protection for your outer perimeter. But unless someone actively monitors the system, an alarm may be too late. Deep Sentinel is proud to offer proactive perimeter protection for businesses either in place of or in collaboration with other systems.

How? A surveillance camera system armed with AI monitors your perimeter and instantly notifies live security guards if someone is onsite. The guards assess the situation and engage with the suspect via 2-way audio, triggering a loud siren and notifying police if necessary.

Deep Sentinel prevents crime before it happens by offering affordable perimeter protection with live guards. Stop intruders well before they reach the front door with a perimeter intrusion detection system designed for the modern age.

Contact us to discuss your requirements of RF970 fiber optic fence security system. Our experienced sales team can help you identify the options that best suit your needs.