Designing Maximum Security Video Surveillance

Author: John Honovich, Published on Apr 20, 2009

Maximum security facilities have far different requirements for video surveillance than typical commercial use. In a maximum security facility, like a nuclear power plant or prison, adversaries must be stopped on-site and in progress. This is far different than typical commercial deployments where investigations are the most common use and detering intruders is a key value.

Design Philosophy of Maximum Level Security Facilities

For maximum level security, systems must be designed to stop adversaries before they reach critical assets (see the classic text on maximum level security). To meet this goal, technology, procedures and people are organized for rapid detecton and response. Video surveillance is used to support 3 goals:

  • Identifying a threat as soon as possible (e.g., perimeter video analytics)
  • Tracking the movements of an adversary (e.g., cameras throughout a facility)
  • Coordinating a real-time response (e.g., VMS software and PSIM)

Of course, video surveillance cannot be used alone. Barriers must be employed (fences, doors, gates, etc.) to slow the movements of adversaries. Guards must be able to respond quickly. Indeed, guards must be able to respond in less time than it takes to identify the threat and for the adversaries to pass the barriers.

When done correctly, some deterence is gained because adversaries may realize the low probability of success and investigations may be unecessary because attacks are either averted or stopped in progress.

Indetifying a Threat

Using video surveillance to identify threats is a relatively new approach to maximum level security system design. The most common historical approach is to use sentries (i.e., guards) or electronic/mechanical systems (like leaky coax, fiber optics, pressure sensors).  In the last decade, using video surveillance cameras with video analytics has become a third major option. The benefits of using video surveillance cameras is that they provide identification and verification in a single device. The drawbacks of video analytics is the accuracy (though all of these devices have certain weaknesses in various environmental conditions or intrusion scenarios).

For any identification tool, the goal is to place the sensors as far out as possible and with barriers in between to maximize the time to review and respond to the identification.

Tracking the Movements of an Adversary

Once an intrusion is detected, in a maximum security facility, guards must be able to track exactly where the adversary is moving. This is critical because the goal of such systems is to stop the adversary before they complete their task.

Video surveillance cameras are deployed throughout the facility to enable the guard to track the suspect. In large areas, controllable PTZ cameras will be used so that the guard can move the camera to follow the adversary. These cameras are often supplemented with fixed cameras with a wide area view to help the guard locate the general position of the adversary.

Co-ordinating a Real-Time Response

Since speed is critical, a variety of software systems are often used to help the guard immediately track and not lose the adversary.
  • 2D and 3D Mapping systems that embed the locations of cameras can help the guard determine where a suspect is and where they might be headed
  • PDAs/Phones with video monitoring applications can be used to help the on-foot responders locate and track the adversary
  • Physical Security Information Management systems can be used to coordinate response and trigger other systems (like locking doors or turning on lights).
The faster and more likely security can respond to an adversary, the higher the probability of defeating the intrusion. Software can eliminate risk and reduce time.

Designing Systems

Maximum level security facilities must integrate a variety of technologies into a coherent system that facilitates early identification, lengthy delays and rapid responses.

On the other hand, most organizations do not need and likely cannot afford designing this type of system. However, appreciating and using these principles in any design can help clarify and focus the use of video surveillance technologies to better secure facilities.

Related Reports

Deep Learning Surveillance Startups Deep Problem on Jun 23, 2017
The undeniably good news for the video surveillance market is that we are seeing the rise of more startups than in many years. The cause of this...
Avigilon Announces RADAR-Based Presence Detector on Jun 22, 2017
RADAR is gaining momentum within physical security. Two months after Axis announced a network radar detector, Avigilon has announced a RADAR-Based...
ESX 2017 Final Show Report on Jun 16, 2017
The ESX (Electronic Security Expo) day 3 / Thursday is done and the exhibits are over. IPVM was in Nashville covering it in-depth. Below covers...
RMR Integrator Importance Statistics on Jun 08, 2017
How do integrators feel about offering RMR / recurring revenue services? For many, their business revolves around RMR, while others see no...
US States Security Licensing Guide on May 30, 2017
In the US, many states require integrators to be licensed to install burglar alarms, CCTV, electronic access control, or all three, and...
Alarm Supervision Guide on May 24, 2017
Burglar alarms can constantly monitor the health of attached circuits, sensors, and devices to ensure that they remain operational. This is known...
Aura's 'Invisible Ripple' Next Gen Intrusion Detection Tested on May 23, 2017
Aura Home is a startup intrusion detection system, but it claims new, high-tech sensing that monitors the 'invisible ripples' movement creates,...
Burglar Alarm Partitions Guide on May 10, 2017
Many burglar alarm systems have a single designated level of access for users. A user can arm or disarm the entire alarm by entering a single code....
Alarm Circuits Guide on May 09, 2017
Alarm circuits are a fundamental element of wired burglar systems. Designing the alarm circuit greatly affects its performance. In particular,...
Arming States For Burglar Alarms on May 04, 2017
Burglar alarms give the user the ability to choose how much of their alarm is active at any time. Activating alarm sensors on windows and...

Most Recent Industry Reports

Importance of Sales To Integrators - Statistics on Jun 23, 2017
One of the top trends in the industry over the past few years has been the rise of across-the-board sales (e.g.: Hikvision Sales, Dahua Sale,...
Deep Learning Surveillance Startups Deep Problem on Jun 23, 2017
The undeniably good news for the video surveillance market is that we are seeing the rise of more startups than in many years. The cause of this...
Avigilon Announces RADAR-Based Presence Detector on Jun 22, 2017
RADAR is gaining momentum within physical security. Two months after Axis announced a network radar detector, Avigilon has announced a RADAR-Based...
Covert Cloud Camera Service Launching (KJB) on Jun 22, 2017
Cloud IP cameras, for consumers, has become increasingly commonplace. However, covert cameras, lag there, with few options. Now, North America's...
Manufacturers Shipping Unlicensed H.265 Products on Jun 22, 2017
While H.265 support in video surveillance is growing, IPVM's research shows that most surveillance manufacturers are shipping H.265 products with...
Uniview Low-Cost Bullet PTZ Tested on Jun 21, 2017
Uniview is offering a HD zoom bullet camera, the IPC742SR9-PZ30-32G, with an integrated pan / tilt positioner, for the price of a low-cost...
QSR Video Surveillance Best Practices on Jun 21, 2017
Fast food restaurants or QSRs (quick service restaurants), are frequent victims of crime and fraud. Because they are open late, deal with cash, and...
45 Drives 'Lowest Cost' Enterprise Storage Company Profile on Jun 21, 2017
45 Drives claims the "lowest cost per Hard Drive Slot in the industry." But who or what is '45 Drives'? What started as a product design to...
No Hack, Still Liable, Court Finds ADT on Jun 20, 2017
Recently, ADT has been in the news for a $16 million settlement for a cyber security vulnerability class action suit. One of the most important...
Resolver / PPM 2000 Incident Management Platform Profile on Jun 20, 2017
You might have seen the company whose employees wear hockey jerseys at trade shows and wondered "what do they do?" PPM 2000 has been active in...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact