Perimeter check: Is your property boundary sufficiently protected?

Many companies rely on imposing perimeter security at their property boundaries, with fencing systems using barbed or NATO wire to stop and deter potential perpetrators. However, the question is whether these measures are really sufficient.

Recent events show that such security measures are not always effective. Examples include the ‘Last Generation’ actions at Düsseldorf Airport in July 2023, which disrupted air traffic for hours, or the hostage-taking at Hamburg Airport in November 2023, during which operations were interrupted for over 18 hours. This not only raises questions for passengers waiting at the airport after undergoing strict security checks and observing what is happening, but also for airlines that have to bear the high costs of cancellations.

Why is it so easy to get onto the tarmac when there are strict security checks inside the airport? The situation seems particularly paradoxical when you consider that simple items such as bottles of water are taken from passengers, while attackers outside can easily gain access to the tarmac with dangerous objects.

Weak points in perimeter security: the consequences of poor planning, incorrect installation and deficiencies

The effectiveness of perimeter security is crucial for the protection of critical infrastructures and companies. Especially when facilities are located outdoors and cannot be protected by buildings with facades and intrusion protection.

However, small errors in planning, incorrect installations and deficiencies in execution can significantly compromise security. After a security incident, we as experts assess the course of events (how did the intruders get onto the site?) and take a detailed look at the course of the fence.

In doing so, we always notice these main problems:

  • fence too low
    Material too simple
  • screw connections on connecting elements that are accessible from the outside and standard on the market
  • insufficient protection against undermining/crawling under
    insufficient protection against climbing over
  • Attachments outside the fence that can be used as a climbing aid
  • poles that are too close to the fence and can be used as a ladder

In most cases, you will see fence systems of different designs and quality. Mostly when properties have been enlarged or a section has had to be replaced. It is important that all the security measures taken have been implemented consistently and without gaps. It doesn’t help much if, for example, a three-kilometre-long climbing protection system with a Y-boom and NATO wire has been installed while 10 metres are missing in one section.

Security zoning and design: key elements of effective perimeter protection

A fence system alone, even with additional security devices, does not provide sufficient protection in many cases. Whether climbing over, crawling under, cutting through, screwing or breaking through: In a test setup for a client, we tested various attack scenarios on different types of fencing with different equipment: Whether climbing over, crawling under, cutting through, screwing or breaking through. The result was that in all scenarios, the attacker was successful after a few minutes and was able to overcome the barrier.

The interplay of several security measures, both technical and structural, is crucial. An attacker should be recognised at an early stage and as many barriers should be created to keep them occupied until the intervention forces arrive.

The extent to which an offender needs to be ‘kept busy’ depends on the offenders you are dealing with. Are they casual offenders, professionals or organised criminals? Individual offenders or larger groups? Cautious or risk-taking offenders? Tougher measures should be developed for an experienced offender with a certain willingness to take risks and the appropriate tools than for the occasional offender.

DIN EN 1627 identifies different offender classes. Security zoning provides a good overview of how long it takes an offender to reach the area requiring protection. If you would like to find out more about security zoning, take a look at our video.

The free document from the VdS can also provide good orientation.

Precautions against vehicle breaches at perimeter boundaries

Another important aspect in the design of perimeter security is the consideration of surrounding roads and the possibility of a vehicle breakthrough. This applies not only to potential acts of terrorism or security incidents, such as the incident at Hamburg Airport, but also to accidents, especially if a motorway runs in the immediate vicinity of the perimeter.

To minimise the danger, various design measures can be taken depending on the spatial conditions.These include terrain modelling, which reduces the speed of vehicles by means of lane narrowing, speed bumps or slight S-curves.However, space for such measures is often limited.In such cases, certified drive-through protection devices such as safety bollards and crash barriers that comply with standards such as PAS68 are an alternative.

It is important that these guards are placed within the site to prevent undetected removal or tampering in preparation for an offence.

Peter Dupach

Security Consultant
Peter Dupach is your contact for all aspects of planning physical security and advises our customers online and on site.

Jetzt weiterlesen!

Cyber Security, Management Consulting, Security Consulting

Security 2025: The top trends that no company can ignore

The security landscape is changing rapidly. To stay protected in the future, companies must focus on trends like OSINT, robotics, and Zero Trust by 2025. This article outlines the five key developments that you can’t ignore and a groundbreaking technology that could transform security.

Uncategorized

Deepfakes: More Than Just a Digital Facelift – A Cybersecurity Threat

I recently came across an interesting article by BlackBerry titled "Deepfakes and Digital Deception." It painted a vivid picture of the rising threat of deepfakes in the cybersecurity landscape. While deepfakes can be entertaining, their potential for malicious use is what truly caught my attention. The article effectively highlights how deepfakes, fueled by advancements in generative AI, are becoming increasingly sophisticated and accessible. This ease of creation, coupled with the persuasive power of deepfakes, makes them a potent tool for cybercriminals.

Uncategorized

EU Cyber Resilience Act: Everything you need to know

The EU Cyber Resilience Act (CRA) is a pioneering step towards greater cyber security for digital products in the European Union. This regulation defines binding security standards and protects consumers and companies from increasing cyber threats. In this article, you will learn everything you need to know about the CRA, its scope of application, the requirements and how companies can prepare themselves.

Alternativ zum Formular können Sie uns auch eine E-Mail an info@concepture.de senden.

Instead of the form, you can also send us an email to info@concepture.de.