Maximum security facilities have far different requirements for video surveillance than typical commercial use. In a maximum security facility, like a nuclear power plant or prison, adversaries must be stopped on-site and in progress. This is far different than typical commercial deployments where investigations are the most common use and detering intruders is a key value.
Design Philosophy of Maximum Level Security Facilities
For maximum level security, systems must be designed to stop adversaries before they reach critical assets (see the classic text on maximum level security). To meet this goal, technology, procedures and people are organized for rapid detecton and response. Video surveillance is used to support 3 goals:
- Identifying a threat as soon as possible (e.g., perimeter video analytics)
- Tracking the movements of an adversary (e.g., cameras throughout a facility)
- Coordinating a real-time response (e.g., VMS software and PSIM)
Of course, video surveillance cannot be used alone. Barriers must be employed (fences, doors, gates, etc.) to slow the movements of adversaries. Guards must be able to respond quickly. Indeed, guards must be able to respond in less time than it takes to identify the threat and for the adversaries to pass the barriers.
When done correctly, some deterence is gained because adversaries may realize the low probability of success and investigations may be unecessary because attacks are either averted or stopped in progress.
Indetifying a Threat
Using video surveillance to identify threats is a relatively new approach to maximum level security system design. The most common historical approach is to use sentries (i.e., guards) or electronic/mechanical systems (like leaky coax, fiber optics, pressure sensors). In the last decade, using video surveillance cameras with video analytics has become a third major option. The benefits of using video surveillance cameras is that they provide identification and verification in a single device. The drawbacks of video analytics is the accuracy (though all of these devices have certain weaknesses in various environmental conditions or intrusion scenarios).
For any identification tool, the goal is to place the sensors as far out as possible and with barriers in between to maximize the time to review and respond to the identification.
Tracking the Movements of an Adversary
Once an intrusion is detected, in a maximum security facility, guards must be able to track exactly where the adversary is moving. This is critical because the goal of such systems is to stop the adversary before they complete their task.
Video surveillance cameras are deployed throughout the facility to enable the guard to track the suspect. In large areas, controllable PTZ cameras will be used so that the guard can move the camera to follow the adversary. These cameras are often supplemented with fixed cameras with a wide area view to help the guard locate the general position of the adversary.
Co-ordinating a Real-Time Response
Since speed is critical, a variety of software systems are often used to help the guard immediately track and not lose the adversary.
- 2D and 3D Mapping systems that embed the locations of cameras can help the guard determine where a suspect is and where they might be headed
- PDAs/Phones with video monitoring applications can be used to help the on-foot responders locate and track the adversary
Physical Security Information Management systems can be used to coordinate response and trigger other systems (like locking doors or turning on lights).
The faster and more likely security can respond to an adversary, the higher the probability of defeating the intrusion. Software can eliminate risk and reduce time.
Maximum level security facilities must integrate a variety of technologies into a coherent system that facilitates early identification, lengthy delays and rapid responses.
On the other hand, most organizations do not need and likely cannot afford designing this type of system. However, appreciating and using these principles in any design can help clarify and focus the use of video surveillance technologies to better secure facilities.
on Jul 13, 2017
Alarm.com has become the dominant force in smart home / remote service platform, with ~70% market share, combining their own traditional offering...
Batteries For Alarm Systems Tutorial
on Jul 11, 2017
Alarm systems use backup batteries in order to continue working if an intruder attempts to disable the alarm by cutting power to the building. In...
Safes And Vaults Alarm Sensors
on Jul 07, 2017
Vaults and safes are designed to protect valuables by enclosing them in steel or concrete boxes with thick doors and strong locks. However, any...
Smoke Detectors Guide
on Jul 06, 2017
Smoke detectors and carbon monoxide detectors add a life-safety component to burglar alarm systems. As intrusion detection sensors are used to...
ESX 2017 Final Show Report
on Jun 16, 2017
The ESX (Electronic Security Expo) day 3 / Thursday is done and the exhibits are over. IPVM was in Nashville covering it in-depth.
RMR Integrator Importance Statistics
on Jun 08, 2017
How do integrators feel about offering RMR / recurring revenue services? For many, their business revolves around RMR, while others see no...
US States Security Licensing Guide
on May 30, 2017
In the US, many states require integrators to be licensed to install burglar alarms, CCTV, electronic access control, or all three, and...
Most Recent Industry Reports
Axis Door Station Tested (A8105-E)
on Jul 19, 2017
Axis continues their push into niche markets, especially audio, with network speakers, an IP horn, and video door stations.
We tested Axis'...
Manufacturer Favorability Guide
on Jul 19, 2017
This 120 page PDF guide may be downloaded inside by all IPVM members.
It covers our 20 manufacturer favorability rankings and 20 manufacturer...
Knightscope Laughs off Robot Drowning
on Jul 18, 2017
A day after a Knightscope robot drowned, Knightscope has issued an 'official statement' making fun of the issue:
The implied message is that...
'Suicidal' Knightscope Robot Drowns
on Jul 17, 2017
Knightscope continues its hyper growth, at least when it comes to controversy, this time with a 'suicidal' robot in Washington DC.
And here is...
March Networks Company Profile
on Jul 17, 2017
March Networks was one of the most well-known video surveillance manufacturers of the 2000s.
In 2012, March was acquired by Chinese / American...
Milestone Beats OnSSI In Court
on Jul 17, 2017
The litigation between former partners Milestone and OnSSI has finished, confirmed by both parties.
In April 2016, OnSSI sued Milestone and in...
Power For Burglar Alarms
on Jul 14, 2017
In order to operate, alarm panels require the high voltages found in electrical outlets be converted to the low voltages they run on. In this...