Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical SecurityVideo Surveillance

Rapidly Deployable Beyond-the-Fence Detection

By Logan Harris
SpotterRF- graphica

Graphic A: Fence line sensors can provide adequate coverage at the fence, but up to 2,300 feet of trenching (white dashed lines) is required to bring the sensors to the fence. Graphic courtesy of SpotterRF

SpotterRF- graphicb

Graphic B: Thermal cameras can be a simpler perimeter security solution, especially when analytics are included, but they can be timely and expensive to install. Graphic courtesy of SpotterRF

SpotterRF- graphicc

Graphic C: Compact Surveillance Radars (CSRs) can be combined with PTZ cameras to detect and track threats in a shorter installation time. Graphic courtesy of SpotterRF

SpotterRF- main

A FLIR thermal camera combined with SpotterRF Compact Surveillance Radar is being used at this substation control house to monitor for intruders. Photo courtesy of SpotterRF

SpotterRF- graphica
SpotterRF- graphicb
SpotterRF- graphicc
SpotterRF- main
August 29, 2017

Physical protection of electrical substations is much more critical than simply guarding against copper theft. Recent terrorist attacks on substations and the potential for simultaneous attacks across the U.S. put the entire country at serious risk for major power interruption. Detection devices such as fence sensors, thermal cameras, microwave and passive infrared (PIR) motion sensors all provide some warning against such attacks, but are all limited in their ability to detect threats outside the fence line, and take months to deploy at each site.

In the last five years a new technology, Compact Surveillance Radar (CSR), has emerged to fill that gap by providing wide area coverage (10 to 100s of acres of volumetric coverage) in a small lightweight sensor (< 5 lbs) that is simple and quick to set up using existing infrastructure. 

CSR operates on the same principles as all radars, but its compact size makes it simpler to install and less expensive to utilize. When someone walks into the field of view of a CSR, the radio waves bounce off the person and back to the CSR, which then calculates the precise GPS location and size of the target. The radars then tell the camera to zoom to that location. The camera automatically stays on the target, moving with and tracking it. Because the radars control the cameras, the cameras only move upon detection, which significantly extends the shelf life of the cameras and allows them to last for years without replacement.

CSR, when integrated with PTZ cameras and IP communications, provides early-warning detection and identification of threats both inside and outside the fence line.

While other technologies have attempted to solve the substation security problem, each has disadvantages that make it less practical than a radar/camera solution.

While fence line sensors provide adequate coverage at the fence line, up to 2,300 feet of trenching (white dashed lines in Graphic A above) is required to bring the sensors to the fence and to break the fence into at least five zones.

This means that four to six weeks are required for installation, making this a costly option. And after all of that, the sensors provide detection only, meaning that a camera system must be installed to provide identification of threats.

Thermal camera systems are a somewhat simpler solution, with the identification included in the video analytics (see Graphic B above). However, thermal cameras are again costly and time-consuming to install, and inclement weather – including rain and fog – can cause them the cameras to malfunction.

Because compact surveillance radars have such large coverage areas, the CSRs and the PTZ cameras are mounted right on the control house (see Graphic C above). The radars detect and track the threat and automatically cue the camera on target for identification and continue to follow the threat no matter where they go.

The installation is so simple that it typically requires less than two weeks to complete. The CSR/Camera system delivers all weather, wide area coverage at a fraction of the cost of alternative technologies.

Our critical infrastructure is worth protecting at any cost. Carefully evaluating and weighing the costs and benefits of any security solution is vital in ensuring the protection of power stations, dams, bridges and other vulnerable areas to ensure these assets are kept safe from vandals and terrorists.

KEYWORDS: intrusion detection perimeter security security radar security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Logan Harris is a perimeter security expert and CEO for SpotterRF. He leads out in the discussion surrounding needed FAA regulations empowering organizations to implement drone threat interdiction solutions for critical infrastructure. He may be reached at drones@spotterrf.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security newswire default

    Timeline of Counter-Drone Activity in the U.S. Government

    See More
  • drone-enews

    How to Respond to and Mitigate Drone Threats

    See More
  • UAV Drone Security

    What to Do About Drones? Detect, Identify, Respond

    See More

Related Products

See More Products
  • threat and detection.jpg

    Surveillance and Threat Detection

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×
Graphic A: Fence line sensors can provide adequate coverage at the fence, but up to 2,300 feet of trenching (white dashed lines) is required to bring the sensors to the fence. Graphic courtesy of SpotterRF
Graphic B: Thermal cameras can be a simpler perimeter security solution, especially when analytics are included, but they can be timely and expensive to install. Graphic courtesy of SpotterRF
Graphic C: Compact Surveillance Radars (CSRs) can be combined with PTZ cameras to detect and track threats in a shorter installation time. Graphic courtesy of SpotterRF
A FLIR thermal camera combined with SpotterRF Compact Surveillance Radar is being used at this substation control house to monitor for intruders. Photo courtesy of SpotterRF

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!