Designing Maximum Security Video Surveillance

Author: John Honovich, Published on Apr 20, 2009

Maximum security facilities have far different requirements for video surveillance than typical commercial use. In a maximum security facility, like a nuclear power plant or prison, adversaries must be stopped on-site and in progress. This is far different than typical commercial deployments where investigations are the most common use and detering intruders is a key value.

Design Philosophy of Maximum Level Security Facilities

For maximum level security, systems must be designed to stop adversaries before they reach critical assets (see the classic text on maximum level security). To meet this goal, technology, procedures and people are organized for rapid detecton and response. Video surveillance is used to support 3 goals:

  • Identifying a threat as soon as possible (e.g., perimeter video analytics)
  • Tracking the movements of an adversary (e.g., cameras throughout a facility)
  • Coordinating a real-time response (e.g., VMS software and PSIM)

Of course, video surveillance cannot be used alone. Barriers must be employed (fences, doors, gates, etc.) to slow the movements of adversaries. Guards must be able to respond quickly. Indeed, guards must be able to respond in less time than it takes to identify the threat and for the adversaries to pass the barriers.

When done correctly, some deterence is gained because adversaries may realize the low probability of success and investigations may be unecessary because attacks are either averted or stopped in progress.

Indetifying a Threat

Using video surveillance to identify threats is a relatively new approach to maximum level security system design. The most common historical approach is to use sentries (i.e., guards) or electronic/mechanical systems (like leaky coax, fiber optics, pressure sensors).  In the last decade, using video surveillance cameras with video analytics has become a third major option. The benefits of using video surveillance cameras is that they provide identification and verification in a single device. The drawbacks of video analytics is the accuracy (though all of these devices have certain weaknesses in various environmental conditions or intrusion scenarios).

For any identification tool, the goal is to place the sensors as far out as possible and with barriers in between to maximize the time to review and respond to the identification.

Tracking the Movements of an Adversary

Once an intrusion is detected, in a maximum security facility, guards must be able to track exactly where the adversary is moving. This is critical because the goal of such systems is to stop the adversary before they complete their task.

Video surveillance cameras are deployed throughout the facility to enable the guard to track the suspect. In large areas, controllable PTZ cameras will be used so that the guard can move the camera to follow the adversary. These cameras are often supplemented with fixed cameras with a wide area view to help the guard locate the general position of the adversary.

Co-ordinating a Real-Time Response

Since speed is critical, a variety of software systems are often used to help the guard immediately track and not lose the adversary.
  • 2D and 3D Mapping systems that embed the locations of cameras can help the guard determine where a suspect is and where they might be headed
  • PDAs/Phones with video monitoring applications can be used to help the on-foot responders locate and track the adversary
  • Physical Security Information Management systems can be used to coordinate response and trigger other systems (like locking doors or turning on lights).
The faster and more likely security can respond to an adversary, the higher the probability of defeating the intrusion. Software can eliminate risk and reduce time.

Designing Systems

Maximum level security facilities must integrate a variety of technologies into a coherent system that facilitates early identification, lengthy delays and rapid responses.

On the other hand, most organizations do not need and likely cannot afford designing this type of system. However, appreciating and using these principles in any design can help clarify and focus the use of video surveillance technologies to better secure facilities.

Related Reports

Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Gorilla Technology AI Provider, Raises $15 Million, Profiled on Jan 15, 2019
Gorilla Technology is a Taiwanese video analytics manufacturer that recently announced a $15 million investment from SBI Group, saying this...
CES 2019 Show Report on Jan 10, 2019
IPVM was at CES 2019 for the second year (see our CES 2018 Show Final Report) and is reporting on announcements and interesting news from the show...
Worst Products Tested In Past Year on Jan 09, 2019
IPVM has done over 100 tests in the past year. But which products performed the worst? Which ones should users be most aware of? In this report,...
Managed Video Services UL 827B Examined on Jan 09, 2019
Historically, UL listings for central stations have been important, with UL 827 having widespread support. However, few central stations have...
IPVM Best New Products 2019 Opened - 70+ Entrants on Jan 07, 2019
The inaugural IPVM Best New Product Awards has been opened - the industry's first and only program where the awards are not pay-to-play and the...
Axis Tailgate Detection Tested on Jan 04, 2019
Axis is aiming to tackle tailgating, one of access control's biggest issues, with the Tailgating Detector ACAP application. This camera app claims...
European Startup Ajax Profile - They "Stand Against Evil" on Jan 03, 2019
European intrusion detection startup Ajax Systems proclaims: How are they standing against evil? And what are the differentiators and potential...
The Battle For The VSaaS Market Begins 2019 - Alarm.com, Arcules, Eagle Eye, OpenEye, Qumulex, Verkada, More on Jan 02, 2019
2019 will be the year that VSaaS finally becomes a real factor for professional video surveillance. While Video Surveillance as a Service (VSaaS)...
Combating Vaping Epidemic - Halo Smart Sensor Profile on Dec 21, 2018
Youth vaping has become an epidemic, according to the US Surgeon General, while the market leader, Juul, just received a $12.8 billion investment...

Most Recent Industry Reports

The IP Camera Lock-In Trend: Meraki and Verkada on Jan 18, 2019
Open systems and interoperability have not only been big buzzwords over the past decade, but they have also become core features of video...
NYPD Refutes False SCMP Hikvision Story on Jan 18, 2019
The NYPD has refuted the SCMP Hikvision story, the Voice of America has reported. On January 11, 2018, the SCMP alleged that the NYPD was using...
Mobile Surveillance Trailers Guide on Jan 17, 2019
Putting cameras in a place for temporary surveillance where power and communications are not readily available can be complicated and expensive....
Exacq Favorability Results 2019 on Jan 17, 2019
Exacq favorability amongst integrators has declined sharply, in new IPVM statistics, compared to 2017 IPVM statistics for Exacq. Now, over 5 since...
Testing Bandwidth Vs. Low Light on Jan 16, 2019
Nighttime bandwidth spikes are a major concern in video surveillance. Many calculate bandwidth as a single 24/7 number, but bit rates vary...
Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
UK Fines Security Firms For Illegal Direct Marketing on Jan 16, 2019
Two UK security firms have paid over $200,000 in fines for illegally making hundreds of thousands of calls to people registered on a government...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Gorilla Technology AI Provider, Raises $15 Million, Profiled on Jan 15, 2019
Gorilla Technology is a Taiwanese video analytics manufacturer that recently announced a $15 million investment from SBI Group, saying this...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact