Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical SecurityVideo Surveillance

Rapidly Deployable Beyond-the-Fence Detection

By Logan Harris
SpotterRF- graphica

Graphic A: Fence line sensors can provide adequate coverage at the fence, but up to 2,300 feet of trenching (white dashed lines) is required to bring the sensors to the fence. Graphic courtesy of SpotterRF

SpotterRF- graphicb

Graphic B: Thermal cameras can be a simpler perimeter security solution, especially when analytics are included, but they can be timely and expensive to install. Graphic courtesy of SpotterRF

SpotterRF- graphicc

Graphic C: Compact Surveillance Radars (CSRs) can be combined with PTZ cameras to detect and track threats in a shorter installation time. Graphic courtesy of SpotterRF

SpotterRF- main

A FLIR thermal camera combined with SpotterRF Compact Surveillance Radar is being used at this substation control house to monitor for intruders. Photo courtesy of SpotterRF

SpotterRF- graphica
SpotterRF- graphicb
SpotterRF- graphicc
SpotterRF- main
August 29, 2017

Physical protection of electrical substations is much more critical than simply guarding against copper theft. Recent terrorist attacks on substations and the potential for simultaneous attacks across the U.S. put the entire country at serious risk for major power interruption. Detection devices such as fence sensors, thermal cameras, microwave and passive infrared (PIR) motion sensors all provide some warning against such attacks, but are all limited in their ability to detect threats outside the fence line, and take months to deploy at each site.

In the last five years a new technology, Compact Surveillance Radar (CSR), has emerged to fill that gap by providing wide area coverage (10 to 100s of acres of volumetric coverage) in a small lightweight sensor (< 5 lbs) that is simple and quick to set up using existing infrastructure. 

CSR operates on the same principles as all radars, but its compact size makes it simpler to install and less expensive to utilize. When someone walks into the field of view of a CSR, the radio waves bounce off the person and back to the CSR, which then calculates the precise GPS location and size of the target. The radars then tell the camera to zoom to that location. The camera automatically stays on the target, moving with and tracking it. Because the radars control the cameras, the cameras only move upon detection, which significantly extends the shelf life of the cameras and allows them to last for years without replacement.

CSR, when integrated with PTZ cameras and IP communications, provides early-warning detection and identification of threats both inside and outside the fence line.

While other technologies have attempted to solve the substation security problem, each has disadvantages that make it less practical than a radar/camera solution.

While fence line sensors provide adequate coverage at the fence line, up to 2,300 feet of trenching (white dashed lines in Graphic A above) is required to bring the sensors to the fence and to break the fence into at least five zones.

This means that four to six weeks are required for installation, making this a costly option. And after all of that, the sensors provide detection only, meaning that a camera system must be installed to provide identification of threats.

Thermal camera systems are a somewhat simpler solution, with the identification included in the video analytics (see Graphic B above). However, thermal cameras are again costly and time-consuming to install, and inclement weather – including rain and fog – can cause them the cameras to malfunction.

Because compact surveillance radars have such large coverage areas, the CSRs and the PTZ cameras are mounted right on the control house (see Graphic C above). The radars detect and track the threat and automatically cue the camera on target for identification and continue to follow the threat no matter where they go.

The installation is so simple that it typically requires less than two weeks to complete. The CSR/Camera system delivers all weather, wide area coverage at a fraction of the cost of alternative technologies.

Our critical infrastructure is worth protecting at any cost. Carefully evaluating and weighing the costs and benefits of any security solution is vital in ensuring the protection of power stations, dams, bridges and other vulnerable areas to ensure these assets are kept safe from vandals and terrorists.

KEYWORDS: intrusion detection perimeter security security radar security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Logan Harris is a perimeter security expert and CEO for SpotterRF. He leads out in the discussion surrounding needed FAA regulations empowering organizations to implement drone threat interdiction solutions for critical infrastructure. He may be reached at drones@spotterrf.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Timeline of Counter-Drone Activity in the U.S. Government

    See More
  • drone-enews

    How to Respond to and Mitigate Drone Threats

    See More
  • UAV Drone Security

    What to Do About Drones? Detect, Identify, Respond

    See More

Related Products

See More Products
  • threat and detection.jpg

    Surveillance and Threat Detection

  • The Complete Guide to Physical Security

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing