This page contains a Flash digital edition of a book.
Perimeter Intrusion Detection
The testing schedule spans 6 months
“ attempt-to-defeat scenarios are rendered to
or more, in order to account for seasonal
variations in temperature and weather
closely simulate actual intrusion attempts
conditions. The extended testing schedule
also allows the test engineers to monitor without damaging the fence or detection
the durability of a product and assess
maintenance issues in prolonged exposure
systems”
to the elements.
Attempt-to-defeat scenarios are rendered and cutting through the fence (using a nel will become jaded in responding to
to closely simulate actual intrusion attempts specially-designed cutting-simulation tool). alarms generated by animals, environmental
without damaging the fence or detection Any device installed at the Test Facility will factors, or unknown causes. Being able to
systems. Safe Skies engineers are skilled in be subjected to similar attempt-to-defeat accurately identify the causes of alarms
designing security breaches that challenge testing, uniquely defined according to the during the evaluation stage enables Safe
the devices’ detection ranges fairly but rigor- type of technology involved. Skies to determine the particular sensi-
ously. Fence-mounted devices, for instance, Testing scenarios measure the devices’ tivities of each device. A system that alarms
are only to subjected tests that directly true alarm rates, but false alarms or nuisance excessively in high winds should not be
provoke an alarm by imparting physical alarms are also an important consideration installed at an airport that is susceptible to
contact on the fence. This limited range in assessing perimeter detection technolo- these conditions; or, a system that responds
is thoroughly explored through scenarios gies. A system with a high false or nuisance to aircraft noise may not be suitable for
that involve direct climbing, aided climbing alarm rate is ineffective, regardless of its airport installation at all. Determining the
using a ladder, lifting to crawl underneath, actual detection rate, as security person- individual elements to which the devices
0407 asi v12n2 v1.indd 13 6/4/06 9:11:44 pm
Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44