Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

How to Protect an Ever-Expanding Perimeter

Four New York-area men were arrested after a BASE jumping stunt from atop One World Trade Center.

By Diane Ritchey
Perimeter security

When the perimeter is inside a facility, an optical turnstile can work, as is the case with NC State University and one of its recreation facilities.

Perimeter security
Perimeter security

The lighting system at Pennsylvania State University includes new system fixtures mounted directly above fence posts so light distribution is equal on both sides – enhancing security.

Perimeter security

Bollards such as those used at the George H.W. Bush Presidential Library and Museum can be galvanized for corrosion resistance, fitted with an internal warning light for increased visibility and engineered to suit high-traffic volume. If damaged, simply slip off the old and slip on the new.

Perimeter security
Perimeter security
Perimeter security
Perimeter security
May 1, 2014

It was the “Oops” heard ’round the world: the No. 1 terrorist target in the world that is being rebuilt to be the most secure was, in fact, not secure. In fact, it experienced two perimeter security breaches within a few weeks.

Four New York-area men were arrested after a BASE jumping stunt from atop One World Trade Center. Shortly before the BASE jumpers' arrest, a 16-year-old boy from New Jersey was arrested on trespassing charges at the skyscraper. After sneaking past security and riding a secure elevator without an ID, he climbed to the top of the building, took pictures of himself and posted them to social media.

In both incidents, the men and the teenager men snuck into the area through a hole in a fence.

Timothy Parlatore, who is representing one of the BASE jumpers, was quoted as saying by CNN, “One of the first things my client said to me was that how surprised he was at how there was no security whatsoever – how easy it was to just walk right up there in something that the mayor has just recently described as the No. 1 terrorist target in the world.”

It’s not possible to build the perfect security perimeter. But that doesn’t mean you shouldn’t try. Most enterprise security executives agree that just because something is not 100-percent bulletproof doesn’t mean it is worthless. Whether the perimeter is a parking lot around a library, access into a secure facility, or an unfenced area, it needs protection.

For example, at the 90-acre George H.W. Bush Presidential Library and Museum grounds at Texas A&M University, decorative bollards protect the roadways that go into the campus itself.  Kept in the upright position, they can be lowered to let authorized vehicles through.

Security is important to the Library and Museum as it is a premier destination for researchers, students and families, and it houses a number of historical artifacts. The museum’s exhibits guide visitors along an interactive walk that reveals the unique influences and challenges that shaped George Bush’s life and presidency. Visitors can explore and learn about the most important events of the 20th century, from World War II through the Persian Gulf War.      

The Bush Library’s collections include 38 million pages of official and personal papers, one million photographs, 2,500 hours of videotape and 70,000 museum objects. These sources document George Bush’s career as congressman, Ambassador to the United Nations, Chief of the U.S. Liaison Office in China, Chairman of the Republican National Committee, Director of the Central Intelligence Agency, Vice-President and President. Included in the exhibits are items ranging from a 1925 film of George Bush’s first steps in Kennebunkport, Maine, to records and memorabilia from his tenure as the 41st President of the United States. The Museum also contains a special section dedicated to former First Lady Barbara Bush and a classroom designed for students from kindergarten through high school.

As at the Library, Delta DSC8000 decorative bollards are typically deployed in the up position and lowered only to allow authorized vehicles to pass. They are tested to stop and destroy an attacking vehicle weighing 10,000 pounds moving at 65 miles per hour or a 20,000 pound vehicle moving at 46 miles per hour.

The bollard systems operate individually or in groups up to 10 and are used for
intermediate-level security applications. At the Library, bollards have been placed in five strategic areas throughout the grounds. In two locations, only one bollard is used. One is hydraulically operated and the other is manual.  There are also six-bollard, seven-bollard and eight-bollard arrays, all hydraulic.

Individual bollards are up to 12.75 inches in diameter, up to 35 inches high and are usually mounted on 3- to 5-foot centers. Hydraulic versions can be operated by a variety of control systems. Manual versions are counter-balanced and lock in the up or down position. All models are crash-rated and lower to allow passage of authorized vehicles.  

System components consist of the bollards, hydraulic pumping units, control logic boards and control panels. They are impervious to severe weather conditions such as heavy wind debris and sub-zero temperatures.

In another example of security fencing and perimeter security, the Pennsylvania State University recently installed an energy-efficient and portable lighting system to illuminate perimeter fences around University campus construction areas.

Every institution seeks to reduce energy consumption in every way possible. This was the primary goal when the Pennsylvania State University in State College, Pa., sought an energy-efficient solution to provide security lighting for perimeter fences around construction areas. The previous lighting solution was inefficient and problematic.

Massaro Construction Management Services, LLC., a construction management company, was hired for several construction projects on the campus. Temporary chain-link fences with driven posts were installed around the perimeters of all construction areas. Some perimeters were adjacent to high-traffic walkways; others were located in garden or lawn areas. Both situations necessitated lighting to enhance security and safety.

Massaro typically used 120-volt work lights strung along fences, mounted by hooks – each one protected in a glass-enclosed cage. This type of lighting presented many problems – only one side of fence could be illuminated, glass enclosures were subject to breakage, energy consumption was high and 120-volt currents presented a safety risk.

CAST Lighting supplied an LED Perimeter Lighting System customized with quick-connects so lights could be quickly deployed and moved to accommodate temporary fencing needs. The lights were designed to be mounted every 20 feet (every other vertical fence post) along temporary chain link fencing. Long wire pieces were provided with quick-connects every 20 feet to connect the fixtures to the 24-volt power supply. Wires were affixed to fences with removable cable ties. Two transformers supplied power to the entire system. On/Off times were controlled with a built-in timers and photocells. In total, 1,860 feet of temporary fencing was illuminated with the system and installed in less than four hours.

Often, protecting the perimeter is inside a facility, as is the case with the Department of University Recreation at NC State University. Staff at a new recreation facility was having minor issues with traffic flow and unauthorized entry. “Students with an NC State student card have entry, but some without cards were coming into the facility,” says Jason Spivey, Associate Director of Facilities and Resource Management. “We need to be able to control access because not only are memberships limited to students, faculty and staff, but from a risk standpoint as well, as there are heavy weights and machinery and an aquatics center in the facility.”  

After some designs from an architectural firm, Spivey had a Boon Edam optical turnstile installed that integrates with the current software and access control systems in place. “The look was important for us as well as the noise,” Spivey says. “It was also important that it could integrate with our future plans with install a biometrics system, which it does.”

 


Stopping Copper Theft with Video

Copper is such a hot commodity that thieves are going after the metal anywhere they can find it: even a radio station in Leawood, KS. Stolen copper is valuable as scrap because the metal is used for so many items – from fiber optics to plumbing to anything electrical – and the profits are tempting. The business of copper theft nets $1 billion a year to thieves.

When you read between the lines of reports on copper theft you can often see there’s been a serious security misstep, namely that the thief has already done the costly damage and escaped, while law enforcement is attempting to identify after the fact, according to Keith Jentoft at Videofied.

Videofied is designed to assist police in making arrests by video-verifying the alarm event for a verified response. Faster police response can reduce, if not eliminate, losses from the immediate crime as well as prevent future losses (as thieves often move on to other sites to steal more copper).

For Union Broadcasting, copper theft meant that the station couldn’t broadcast, says Jason Justice, Director of Operations. While the station’s offices are in Overland Park, the transmitter site with cameras is in the northern part of Kansas City, a 35-minute drive from the office.            

“We have a very secure transmitter building near the road,” Justice says. “We also have five much smaller sheds at the base of each tower. They are each surrounded by razor wire topped chain link. But thieves cut their way in.”

The Videofied system, mounted on top of the fences, monitors the fences around these radio towers.

“The copper has been replaced, but no one has messed with it again,” Justice says. “We have signs at all entrances to the property. I get emailed video that shows me neighbors walking dogs, deer and the farmer cutting the field. The video system works. It’s very comforting with all the hats I wear that there is one less thing for me to lose sleep over.” 

KEYWORDS: border patrol layered security programs perimeter security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Portraits of Game On Interviewees

    Game On!: How the Pros Secure Facilities, Manage Risk and Protect the Brand

    See More
  • SEC0519-talk-Feat-slide1_900px

    How to Keep Your Top Performers from Leaving

    See More
  • Top 3 Misconceptions About Data After Death - Security Magazine

    Data and the Life Ever After

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×
When the perimeter is inside a facility, an optical turnstile can work, as is the case with NC State University and one of its recreation facilities.
The lighting system at Pennsylvania State University includes new system fixtures mounted directly above fence posts so light distribution is equal on both sides – enhancing security.
Bollards such as those used at the George H.W. Bush Presidential Library and Museum can be galvanized for corrosion resistance, fitted with an internal warning light for increased visibility and engineered to suit high-traffic volume. If damaged, simply slip off the old and slip on the new.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!