ПІДТВЕРДЖУВАЛЬНЕ ПОВІДОМЛЕННЯ
Наказом Міністерства економічного розвитку і торгівлі України
від 30.12.2014 № 1494
CEN/TR 16705:2014
en: Perimeter protection - Performance classification methodology
прийнято як національний стандарт
методом підтвердження за позначенням
uk: Захист периметру. Методологія класифікації виконання
(CEN/TR 16705:2014, IDT)
З наданням чинності від 2016-01-01
CEN/TR16705
April 2014
Protection perimetrique - Methode de classification de
performance
Schutz von Grundstucksgrenzen - Methodologie fur eine
Leistungsklassifizierung
TECHNICAL REPORT
RAPPORT TECHNIQUE
TECHNISCHER BERICHT
ICS 13.310
English Version
Perimeter protection - Performance classification methodology
This Technical Report was approved by CEN on 25 March 2014. It has been drawn up by the Technical Committee CEN/TC 388.
CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.
EUROPEAN COMMITTEE FOR STANDARDIZATION
СОМІТЁ EUROPEEN DE NORMALISATION
EUROPAISCHES KOMITEE FUR NORMUNG
CEN-CENELEC Management Centre: Avenue Marnix 17, B-1000 Brussels
©
Ref. No. CEN/TR 16705:2014 E
2014 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members.Contents Page
Foreword 5
0 Introduction 6
0.1 Purpose 6
0.2 Approach 6
0.3 Vital infrastructure 6
Scope 7
Normative references 7
Terms and definitions 7
Performance classification methodology 15
Outline of the approach 15
Determining the required the level of protection - picture of the methodology 16
Assumptions and starting point making the calculation model 18
The questionnaire of the calculation the model 20
Introduction to the questionnaire 20
Text of the questionnaire annex data entry sheet 21
Modus operandi 24
Introduction 24
Aggressor types 24
Scenarios 25
Toolsets 25
Risk assessment methodology 25
General 25
Risk - Target identification 26
Threats 26
Site characterization 26
General 26
Site and physical environment 26
Human and social factors of the environment 27
Use of the site 27
Type of access 27
Level of protection 27
Determining functional requirements 28
Introduction 28
Questions for establishing the functional requirement 28
Elements of possible solutions 29
Introduction 29
Elements of delay 29
Overview of elements of delay 29
Fences 30
Walls 31
Barriers 32
Gates 32
Roadblockers, Bollards 32
Elements of detection 32
Introduction 32
Overview of elements of detection 32
Detection 33
Exterior sensors PI DS 33
Lighting 33
Entry/exit control 33
External elements 34
Local law and regulations 34
Inventories 34
On testing 35
Security system operational requirements - Q and A 36
Framework for perimeter protection systems evaluation 39
An environmental and organizational checklist for perimeter protection 41
C.1 Introduction 41
C.2 Environmental checklist for perimeter protection 41
C.3 Organizational checklist for perimeter protection 45
A perimeter security technologies classification 49
D.1 Introduction 49
D.2 Four families for intrusion detection 49
D.2.1 Structure of the annex 49
D.2.2 Structure of the four main Tables D.3 to D.6 50
D.3 Stand-alone equipment 54
D.4 Fence-mounted sensors 58
D.5 Active Physical security 59
D.6 Underground sensors 62
Inventory of perimeter intruder detection systems (PIDs) 64
E.1 Introduction 64
E.2 Combination of two sensors 65
Matrix of current systems and (generic type) products 71
On Perimeter surveillance and burglary resistance 86
G.1 Introduction 86
G.2 Use of detection systems for perimeter protection 86
G.2.1 Basic requirements for perimeter surveillance systems 86
G.2.2 Basic principles of the detection systems 88
G.2.3 Comparison of detection systems 89
G.2.4 Summary 89
G.3 Classification for burglary resistance 90
G.3.1 Recommendations for the assessment of the resistance class 90
G.3.2 DIN-Standards for burglar resistance 91
Pictures offences, gates and entrance barriers 92
H.1 Introduction 92
H.2 Different sorts of fences 92
H.2.1 Vegetable fences 92
H.2.2 Wood palisade 93
H.2.3 Walls 94
H.2.4 Metallic fences 96
H.2.5 Combinations of systems 99
H.3 Supplementary accessories 100
H.3.1 Razor wire 100
H.3.2 Sharp pins 100
H.4 Gates and entrance barriers 101
H.4.1 Gates 101
H .4.2 Road obstacles 102
Annex I CEN Workshop Agreement CWA 16221 104
1.1 I.2 I.3 |
Introduction 104 Scope of CWA 16221:2010 104 Table of Content of CWA 16221:2010 105 |
Bibliography 109Foreword
This document (CEN/TR 16705:2014) has been prepared by Technical Committee CEN/TC 388 “Perimeter protection”, the secretariat of which is held by NEN.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. CEN [and/or CENELEC] shall not be held responsible for identifying any or all such patent rights.
The elaboration of this Technical Specification has been financially supported by the European Commission and the CIPS Programme (Grant Agreement № HCME/2009/CIPS/FP/CEN-001).0 Introduction
0.1 Purpose
The increasing need for customers to be able to select and purchase perimeter protection solutions that fit their needs calls for a generic and structured approach to the assessment of risks, to the identification of functional requirements, to the classification of perimeter protection solutions, including organizational measures, and to the design and test criteria for such perimeter protection solutions. This Technical Report is a step in the development of that approach.
The general goal that has been set is to make a European Standard that is applicable to a wide range of perimeter protection solutions, covering the needs for basic barriers and entrance solutions to more complex, high security solutions.
This Technical Report firstly describes the conceptual basis for further development of security performance requirements, technical specifications and test methods for use in perimeter protection systems in a European context. The report focusses on the performance classification methodology for the identification of the desired systems performance.
Secondly this Technical Report presents the results of inventories that have been made on current systems and (generic type) products that are available to the design engineer in both the public and private sector, relevant member states regulations, relevant documents from CEN, CEN/TC 325, ISO and other sources. The results are presented in annexes to this report.
This Technical Report therefore aims at providing information to be used for the design of future activities for making the 'perimeter protection standard'. It is not intended as a guidance for the actual development of perimeter protection systems. Nonetheless the information in this report may function as an aid to practitioners in their choice of appropriate measures in order to meet the diverse requirements.
0.2 Approach
Perimeter protection projects call for the interaction between suppliers of perimeter protection solutions, their customers and other relevant stakeholders. Only the proper interaction between these parties will lead to valid analyses and a certified perimeter protection solution.
A sequence of steps leading to the risk assessment, requested level of protection, functional requirements and basic selection of perimeter protection solution is proposed. The choice of the measure(s) to be taken depends upon a number of factors which include but are not restricted to: the local environment, the purpose of the measure(s), type property to be protected and environmental and organizational factors.
Perimeter protection systems or components may be used independently such as a perimeter fence or in combination with other measures in order to provide a more holistic solution such as a fence and gate. This approach may be extended to include Closed-Circuit TV systems (CCTV) and Perimeter Intruder Devices (PID).
To determine the risk involved for a site requiring perimeter protection is, for the most part, comparable to the analysis required for any given asset. Therefore this Technical Report builds on the work done for risk analysis by CEN/TC 325 'Crime prevention through building, facility and area design'.
0.3 Vital infrastructure
It is recognized that with regard to vital infrastructure and very high risk objects, the generic approach indicated in this Technical Report may not suffice and additional checklists and risk assessment tools may be required. There will be particular threats and modus operand! that should be considered when assessing vital infrastructure and very high risk objects that are outside the scope of this TR. For this reference can be made to documents from national authorities, etc.
Scope
This Technical Report aims at providing information to be used for the design of the future activities for making a 'perimeter protection standard'.
This CEN Technical Report describes a performance classification methodology for the identification of the desired systems performance for perimeter protection systems. It also gives a conceptual framework for matching the desired performance and the capabilities of a possible solution.
Furthermore this CEN Technical Report presents the results of inventories that have been made on current systems and (generic type) products, relevant member states regulations, relevant documents from CEN, CEN/TC 325, ISO and other sources. It should be noted that these inventories cannot be considered complete and any values given should be considered indicative values.
The following subjects are not covered by this Technical Report:
threats approaching from the sea side;
threats approaching through the air.
It is recognized that with regard to vital infrastructure and very high risk objects the generic system approach indicated in this Technical Report may not suffice and additional checklists and risk assessment tools may be required.
Normative references
Not applicable.
Terms and definitions
For the purposes of this document, the following terms and definitions apply.
NOTE The terms have been divided into three main perimeter related security categories: General, Electronic Security and Physical Security. The definitions are taken from existing documents as much as possible. Important sources are EN 14383-1:2006 [1], the term and definition standard from CEN/TC 325 "Crime prevention through building, facility and area design", and the Centre for Applied Science and Technology (CAST) [2].
General.
access control
set of techniques, means or procedures to control the passage of people and vehicles into and out of protected areas
[SOURCE: EN 14383-1:2006]
Note 1 to entry: Such systems allow levels of access rights and optionally the traceability of access, ranging from no entry to free traffic. The access control can be mechanical, human, electronic or a combination of these systems.
burglary
action of breaking into any premises with the purpose of theft
[SOURCE: EN 14383-1: 2006, modified]
neighbourhood
immediate surroundings of a secure site and their population
[SOURCE: EN 14383-1:2006]
operational requirement
statement of needs based upon a thorough and systematic assessment of the problems to be solved and the desired solutions
[SOURCE: PAS 68:2013]
perimetric space
space in close vicinity of the building (from the perimeter to the building envelope, including the accesses)
[SOURCE: EN 14383-1:2006]
peripheral space
land and neighbourhood around one or several sites
[SOURCE: EN 14383-1:2006]
risk analysis
identification and evaluation of threats
[SOURCE: EN 14383-1:2006, modified]
risk assessment
categorization of risks and measurement of their likelihood
[SOURCE: EN 14383-1:2006]
safety
freedom from unacceptable risk
[SOURCE: EN 14383-1:2006]
secure area
mechanically and/or electronically enclosed area protected for safety and/or security purposes [1]
security
freedom from an intended risk
[SOURCE: EN 14383-1:2006]
Note 1 to entry: Security is the condition of being protected against danger or loss. It is achieved through the mitigation of adverse consequences associated with the intentional or unwarranted actions of others. See [7].
standoff
distance that threat (e.g. vehicle, person, any potential explosive effect) may be allowed to encroach upon a perimeter or asset
[SOURCE: PAS 38:2013]
Electronic security.
active infrared
infrared beams transmitted between a transmitter and receiver which are broken when an intruder passes through
[SOURCE: PAS 38:2013]
Note 1 to entry: The receiver detects this as a drop in signal level.
alarm transmission
automatic transmission of alarm signals from an intrusion detection system to a monitoring centre or to a private individual
[SOURCE: EN 14383-1: 2006]
dead zone
area bounded by, or laying within the detection zone where a target cannot be detected
Note 1 to entry: That is either intrinsic to the detection system or due to some topographical feature within the detection zone (i.e. obstacle or hollow).
detection rate (DR)
measure of a system’s capacity to detect an intrusion attempt (true alarm) through the zone protected by the system
[SOURCE: Centre for Applied Science and Technology (CAST)]
detection zone
area over which a detection system is configured to monitor for intruders
Note 1 to entry: The detection zone can also have upper and lower bounds: the detection ceiling and the detection floor.
doppler microwave
unit that emits a microwave field and monitors reflections
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: Motions from an intruder cause a change in the reflected signal received by the detector.
dual technology
combination of two separate technologies
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: For free-standing applications these technologies tend to be passive Infrared combined with doppler microwave, though other combinations exist.
3.2.8
environmental information / conditions
data pertaining to both weather and wildlife events in the vicinity of the perimeter
[SOURCE: Centre for Applied Science and Technology (CAST)]
3.2.9
electrified fence
detection system comprising horizontal electrical conductors which are energized approximately every 2 s with typically a 10,000 volt pulse
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: This pulse voltage will decrease if the fence is touched or is short circuited to ground and an alarm condition can be raised.
3.2.10
electrostatic field disturbance
arrays of wires create an electromagnetic field and sense either the current induced in neighbouring wires or the capacitance between the transmitter and the ground
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: The capacitancy varies when an intruder approaches the barrier. Ported coax and leaky feeder systems come under this definition.
3.2.11
fabric-mounted PIDS
detection systems that are attached directly to the barrier material (as opposed to the fence posts)
[SOURCE: Centre for Applied Science and Technology (CAST)]
3.2.12
false alarm
alarm not caused by a human breaching the detection zone
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: Typically, false alarms are caused by animals, the effects of the weather or may have no obvious cause.
Note 2 to entry: Alternative definition:
alarm condition which has not resulted from:
a criminal attack, or attempt at such, upon/to the supervised premises, the alarm equipment or the line carrying the alarm signal; or
damage, or attempt at such, to the supervised premises, the alarm equipment or the line carrying the alarm signal; or
actions by emergency services in the execution of their duties.
3.2.13
false alarm rate
FAR
measure of a system's capacity to avoid generating alarms which are not caused by human activity
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry; False alarm rate (FAR) is expressed as the number of false alarms per day per kilometre (ADK).
3.2.14
fibre optic - interferometric
deformation of the detection cable causes a change in the path length in the fibre and hence the phase of laser light transmitted within the fibre
[SOURCE: Centre for Applied Science and Technology (CAST)]
3.2.15
fluid-filled tubes
parallel tubes typically filled with liquid are pressurized and connected via a piezoelectric membrane producing a balanced system
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: Differential pressure on the ground forces the fluid between the tubes and generates a voltage at the piezoelectric element. Requires access pits to pressurize the tubes and house the sensors.
3.2.16
geophone (point sensor)
series of low frequency microphones or accelerometers connected together and their outputs analyzed
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: Addressable point sensors can attribute alarms to a particular sensor.
3.2.17
height of detection zone
nominal maximum height of the detection zone relative to ground level
3.2.18
inductive cable
cable with conductive wires suspended in a magnetic field
[SOURCE: Centre for Applied Science and Technology (CAST)]
Note 1 to entry: Small currents are induced when the barrier and cable are disturbed.
3.2.19
maximum speed of crossing
maximum speed (metres per second) at which a target crossing the detection zone can travel and be successfully detected