Designing Maximum Security Video Surveillance

Author: John Honovich, Published on Apr 20, 2009

Maximum security facilities have far different requirements for video surveillance than typical commercial use. In a maximum security facility, like a nuclear power plant or prison, adversaries must be stopped on-site and in progress. This is far different than typical commercial deployments where investigations are the most common use and detering intruders is a key value.

Design Philosophy of Maximum Level Security Facilities

For maximum level security, systems must be designed to stop adversaries before they reach critical assets (see the classic text on maximum level security). To meet this goal, technology, procedures and people are organized for rapid detecton and response. Video surveillance is used to support 3 goals:

  • Identifying a threat as soon as possible (e.g., perimeter video analytics)
  • Tracking the movements of an adversary (e.g., cameras throughout a facility)
  • Coordinating a real-time response (e.g., VMS software and PSIM)

Of course, video surveillance cannot be used alone. Barriers must be employed (fences, doors, gates, etc.) to slow the movements of adversaries. Guards must be able to respond quickly. Indeed, guards must be able to respond in less time than it takes to identify the threat and for the adversaries to pass the barriers.

When done correctly, some deterence is gained because adversaries may realize the low probability of success and investigations may be unecessary because attacks are either averted or stopped in progress.

Indetifying a Threat

Using video surveillance to identify threats is a relatively new approach to maximum level security system design. The most common historical approach is to use sentries (i.e., guards) or electronic/mechanical systems (like leaky coax, fiber optics, pressure sensors).  In the last decade, using video surveillance cameras with video analytics has become a third major option. The benefits of using video surveillance cameras is that they provide identification and verification in a single device. The drawbacks of video analytics is the accuracy (though all of these devices have certain weaknesses in various environmental conditions or intrusion scenarios).

For any identification tool, the goal is to place the sensors as far out as possible and with barriers in between to maximize the time to review and respond to the identification.

Tracking the Movements of an Adversary

Once an intrusion is detected, in a maximum security facility, guards must be able to track exactly where the adversary is moving. This is critical because the goal of such systems is to stop the adversary before they complete their task.

Video surveillance cameras are deployed throughout the facility to enable the guard to track the suspect. In large areas, controllable PTZ cameras will be used so that the guard can move the camera to follow the adversary. These cameras are often supplemented with fixed cameras with a wide area view to help the guard locate the general position of the adversary.

Co-ordinating a Real-Time Response

Since speed is critical, a variety of software systems are often used to help the guard immediately track and not lose the adversary.
  • 2D and 3D Mapping systems that embed the locations of cameras can help the guard determine where a suspect is and where they might be headed
  • PDAs/Phones with video monitoring applications can be used to help the on-foot responders locate and track the adversary
  • Physical Security Information Management systems can be used to coordinate response and trigger other systems (like locking doors or turning on lights).
The faster and more likely security can respond to an adversary, the higher the probability of defeating the intrusion. Software can eliminate risk and reduce time.

Designing Systems

Maximum level security facilities must integrate a variety of technologies into a coherent system that facilitates early identification, lengthy delays and rapid responses.

On the other hand, most organizations do not need and likely cannot afford designing this type of system. However, appreciating and using these principles in any design can help clarify and focus the use of video surveillance technologies to better secure facilities.

Related Reports

Nest Secure Alarm System Tested on Nov 16, 2017
Google's expansion continues, this time into home security with their Nest subsidiary's move into alarm systems. They paid more than a...
Top 2017 Trends - Cyber and Analytics on Nov 09, 2017
The 2 clear top 2017 trends, according to IPVM integrator statistics are: Cyber Security Video Analytics This is a change from 2016...
Honeywell Crowdfunding Bombs on Nov 08, 2017
100,000+ employees and $40,000,000,000 in annual revenue. That's Honeywell. ~200 backers and ~$67,000 in funding in a week. That's Honeywell...
Honeywell Indiegogo-Funded DIY Intrusion System Examined on Nov 02, 2017
Honeywell did $39 Billion dollars in revenue last year, but they are asking the public for $50,000 (.0001% of revenue) to fund their Indiegogo...
Deep Learning Tutorial For Video Surveillance on Oct 17, 2017
Deep learning is a growing buzzword within physical security and video surveillance. But what is 'deep learning'? In this tutorial, we explain...
Startup Turing Video Segway-Based Security Robot Profile on Sep 13, 2017
If security robots can not replace guards, perhaps the next best thing is a robot the guard can actually ride.  Turing Video has raised $5...
Alarm.com Vs. Honeywell Total Connect Shootout on Aug 30, 2017
In the smarthome and intrusion market, Alarm.com and Honeywell are two of the biggest names. Both platforms offer remote management of alarms, home...
BBC Featured Deep Learning Face Recognition Analyzed (Digital Barriers) on Aug 30, 2017
The UK's largest broadcaster, BBC, recently featured Digital Barriers (also based in the UK) on a segment highlighting face recognition technology....
Nvidia For Video Surveillance Examined on Aug 23, 2017
Nvidia is making a big push into the security market, claiming more than 50 partners, investing heavily in industry events, positioning their GPUs...
Honeywell Total Connect 2.0 Tested on Aug 22, 2017
Honeywell is one of the biggest brands in security, with Total Connect 2.0 being the company's remote security and smarthome platform. We bought...

Most Recent Industry Reports

Panasonic Unified Surveillance Strategy Analyzed on Nov 17, 2017
Panasonic is now a "Unified Surveillance" offering, as their ASIS 2017 booth proclaimed: Looking to make a comeback in the security industry,...
Amazon Cloud Cam Is Poor (Tested) on Nov 17, 2017
Retail behemoth Amazon has entered the surveillance market with the Amazon Cloud Cam, the eyes of its just-announced Amazon Key delivery...
Nest Secure Alarm System Tested on Nov 16, 2017
Google's expansion continues, this time into home security with their Nest subsidiary's move into alarm systems. They paid more than a...
Dahua Forbes 'Next Web Crisis' Vulnerability Dispute on Nov 16, 2017
The buffer overflow vulnerability in Dahua products is not in dispute, in fact we covered it when it was first published. What is in dispute is...
Isonas Cofounders Split, Launch Partner/Competitor on Nov 16, 2017
Breaking up is hard to do, especially when door access security is at stake. But that is exactly what has happened at Isonas. Senior employees...
Hikvision China Criticizes The WSJ on Nov 15, 2017
Hikvision, through the Chinese government's authoritative news service, has criticized the WSJ investigation into Hikvision. In this...
PoE UPS Tested (Energy Reconnect) on Nov 15, 2017
In security, backup power is important, but most often requires UPS systems or extra cabling to devices for low voltage power. Now, some have...
Axis Commits To Long-Term Firmware Support on Nov 15, 2017
With the rise of cyber security awareness, and a general increase in hardware reliability, "software warranties" may prove more valuable than...
Hikvision NVR 4.0 Improvements Tested on Nov 14, 2017
Hikvision has released firmware version 4.0 for select NVRs, touting two years of research and development, and claiming "the new generation GUI...
Vivotek Remote Stack Overflow Vulnerability on Nov 14, 2017
A stack overflow vulnerability in Vivotek cameras has been discovered by bashis, the security researcher who has also found vulnerabilities in...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact