The Pursuit of Perfect Perimeter Protection
Border Projects Set Tone for Wave of Public-Assisted Security
There is a new frontier of security technology arising from the communal, interactive influence of the Internet world.
You may have recently noticed the term Web 2.0 being used. Roughly, this translates into the World Wide Web Version 2 or a second generation of the Internet. In this generation, the user becomes an integral part of the Web activity. This is currently visible in Web activities such as blogs and wikis, where the user provides control and input to the Web site. Additionally, RSS (real simple syndication) feed technology allows for selected material to be sent to users automatically. The user feels more a part of the Web experience and shares in a community-oriented environment.
The same is starting to happen in security, in particular border security. This beta project is known as the Virtual Neighborhood Border Watch Program. The state of Texas has been testing video surveillance cameras in different environments along the 1,240-mile Texas/Mexico border using the Internet to transmit surveillance images to the public. The last stage of the test is to stress the system by providing public access to numerous surveillance cameras.
During this phase of the program, various technical aspects of the system are undergoing stress testing. Delivering streaming video from a live camera source to thousands of people at a time is a very elaborate technical operation. Currently, various camera systems, media servers and network configurations are being applied and reviewed for their effectiveness.
In this $5 million project the public can, after a brief registration, log onto the Texas Border Watch Web site (www.texasborderwatch.com). They then can view 24/7 any one of many remotely located Web-based cameras in order to view any suspicious activity. Each viewing Web page has a Report Suspicious Activity icon in which the viewer can alert the U.S. Border Patrol of a suspected incident.
Some of the equipment used in this and similar border projects include Burnaby, British Columbia, Canada-based Extreme CCTV’s Ex-70 explosion-protected housings with Park Ridge, N.Y.-based Sony CCD 600 line cameras; San Diego-based Trango Systems’ wireless 5.8GHz analog and IP broadband video transmission systems; Thermal Ranger 2000 active infrared cameras from Cantronic of Bellingham, Wash.; and Clovis, Calif.-based Pelco’s Esprit system with IOP (integrated optics package) cameras.
As methods of new Internet communication increasingly branch out to the public, the security industry can expect to see more v. 2.0-type programs. How the public responds and the reliability of these programs remains to be seen.
Chain-Link Fencing Is Often First Line of Perimeter Defense
Any good perimeter security program will probably include chain-link fencing. Chain-link fencing has been the product of choice for security fencing for more than 60 years because of its strength, corrosion resistance, “see thru capabilities,” ease of installation, versatility, variety of product selection and value.
A chain-link fence is one of the primary building blocks for a facility’s perimeter security system. As outlined by the Chain Link Fence Manufacturers Institute, the physical security barrier provided by a chain-link fence provides one or more of the following functions:
- Provides notice of lega
l boundary of the outermost limits of a facility - Assists in controlling and screening authorized entries into a secured area by deterring entry elsewhere along the boundary
- Supports surveillance, detection, assessment and other security functions by providing a zone for installing intrusion detection equipment and CCTV
- Deters casual intruders from penetrating a secured area by presenting a barrier that requires an overt action to enter
- Demonstrates the intent of an intruder by their overt action of gaining entry
- Causes a delay to obtain access to a facility, thereby increasing the possibility of detection
- Creates a psychological deterrent
- Reduces the number of security guards required and frequency of use for each post
- Optimizes the use of security personnel, while enhancing the capabilities for detection and apprehension of unauthorized individuals
- Demonstrates a corporate concern for facility security
- Provides a cost-effective method of protecting facilities
A good chain-link fence specification reference source is the “Chain Link Manufacturers Institute Product Manual.” For more information, visit www.chainlinkinfo.org.
For the complete version of this story, see the January issue of Security Sales & Integration magazine.
If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!
Security Is Our Business, Too
For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.
A FREE subscription to the top resource for security and integration industry will prove to be invaluable.