Increased efforts to protect critical airport infrastructure following 9/11 have led to increased budget allocations to combat security threats and protect airport perimeters. Accordingly, ClearView have adopted a proactive approach to install integrated security solutions that will be interoperable with new emerging technologies, as well as legacy security systems.
With the United States , Western Europe and Asia Pacific nations as well as certain countries in South America exhibiting tremendous growth in the number of airline passengers, airports require strong, proactive security solutions. The perimeter still remains a vulnerable target for terrorism, which is highly adaptable.
Currently, a greater number of airports are switching to digital networks, rendering it essential to network all security solutions to the main command, control and communications (C3) centre. Further, as layered technology security solutions gain importance, integrated network systems are driving increased airport sales. ClearView's interoperable and layered security solutions, which feature open architecture structures are become crucial for airport operators.
ClearView can provide design expertise in physical fence lines, closed circuit television (CCTV) cameras and intelligent video surveillance, command, control and communications (C3) centres as well as interoperable network solutions.
The following technologies are commonly considered by ClearView's risk assessment and design teams when considering security issues relating to airports:
- Fencing Systems:(including Taut Wire, Infrared/Thermographic Sensing): Fencing systems determine boundaries, deter casual intruders, control access and create delays in the event of intrusion.
- Taut Wire: Wire that is tightly wound around a fence line that signals movement or tampering.
- Fiber Optic: Glass fiber optic cable is used in video signals that communicate between short or long run locations. It is also used in remote sensing, buried under the secure side of a barrier and can sense light movements
- Intelligent CCTV: Intelligent video analyses specific behaviour patterns and algorithms and assesses the scene for security breaches. It possesses capabilities to alert the specific authorities through network systems.
- False Alarms: No alarm stimulation.
- Nuisance Alarms: Detection of stimuli that was not an attempt to enter the perimeter.
- Perimeter Intrusion Detection System (PIDS): Set detection systems and technologies that define, observe, control, and sense entry into a secure area.
- Access Control System (ACS): This manages various combinations of entry, exit and movement within sterile and non-protected areas. ACS is a subsystem that supports intrusion detection systems.
- Digital Video Recording: This refers to the recording, stores, management and analysis of video streams.
- Perimeter and Access Control: This refers to simple barriers, fences, identity badges and other means of intrusion control, as well as devices that help in access control at airports.
- Closed-circuit Television (CCTV): This refers to the video system of a collection of CCTV cameras and surveillance that act as virtual barriers and assess the situation. The use of CCTV cameras for close scrutiny and observation allows for quick response time.
- Volumetric Sensing: Volumetric sending monitors the physical space adjacent to fence lines for system penetration.
- Digital Systems: Digital signal processing are used to evaluate alarms; characterised by very open architecture systems, large camera installations and a wide variety of technologies.