Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Perimeter security

From Wikipedia, the free encyclopedia
Fortifications to keep intruders out
This article has multiple issues. Please helpimprove it or discuss these issues on thetalk page.(Learn how and when to remove these messages)
This articleis written like apersonal reflection, personal essay, or argumentative essay that states a Wikipedia editor's personal feelings or presents an original argument about a topic. Pleasehelp improve it by rewriting it in anencyclopedic style.(February 2020) (Learn how and when to remove this message)
icon
This articleneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Perimeter security" – news ·newspapers ·books ·scholar ·JSTOR
(June 2024) (Learn how and when to remove this message)
(Learn how and when to remove this message)

Perimeter security refers tonatural barriers or constructed fortifications designed either to prevent intruders from entering an area or to contain individuals within an enclosed area.

Purpose

[edit]

Since at least theRoman Empire, fortifications,walls and barriers have been an important part of protecting sovereign territories and private property. Perimeter security is designed with the primary purpose to either keep intruders out or captives contained within the area the boundary surrounds. Both natural and manmade barriers can serve as perimeter security.[1]

Governments use perimeter security not only for the safety of their citizens, but to control the flow of commerce and immigration, as well as to protect vital infrastructure from attackers. Property owners and organizations of all sizes use various man-made technology to achieve varying degrees of perimeter security.

History

[edit]

One of the earliest known instances of perimeter security on a large scale isHadrian's Wall in the Roman Empire. Around 122 AD, the wall was built along the northern border of the empire out ofturf, and later stone. Theories regarding the wall's purpose vary, but most scholars agree it was probably built at least in part for the defense of the empire.

Perhaps the most famous illustration of perimeter security in ancient times wasthe Great Wall of China. It was originally built to withstand nomadic invaders from the North. The wall was successful to some degree, although it has been suggested that it served as more of a psychological barrier than a physical barrier.[2]

In warfare, securing the perimeter has proven vital to military forces. From sharpened pikes inmedieval times to more modern technological solutions, armed forces have always sought to prevent their enemies from breaching their front lines. In theAmerican Civil War and both World Wars, as well as theKorean andVietnam Wars,landmines were used extensively to create tactical barriers between enemy lines. These tactics are sometimes controversial because of the loss of civilian life.[3]

InWorld War II, theGerman military developed concrete barriers calleddragon's teeth to slow the approach of enemy tanks. This tactic was adopted by allied forces, and lines of reinforced concrete pyramids can still be seen throughout Europe today.

One example of perimeter protection still in use israzor wire fencing. While U.S. ranchers in the 19th century kept cattle in and rustlers out withbarbed wire,World War I saw the advent of specialized barbed wire to secure military operations.[4][5] The 1965 escalation of theVietnam War was accelerated by the successful penetration of ten-foot-highconcertina wire fencing aroundCamp Holloway. Variations of this type of perimeter protection were used throughout the 20th century.Booby traps,electric fencing,watchtowers and nightflares were also employed to keep enemy forces out.

Natural barriers

[edit]

The mountains, rivers, oceans, deserts, canyons, and glaciers of the world have long provided a natural barrier to invasion and trade among competing groups. A prime example is India's isolation from the rest of Asia due to theHimalayas.[6] TheEnglish Channel proved invaluable in World War II as a deterrent to Nazi aggression.[7] England's relative isolation allowed allied forces to use it as a staging area for theD-Day invasion, which turned the tide of the war. TheRocky Mountains in North America proved a formidable perimeter protection of isolated native cultures for centuries. Likewise, exploitation ofAlaska's rich resources was greatly delayed while innovation lagged in breaking through the icy and oceanic perimeter.

Technology has largely overcome most of the world's natural barriers. Only deep in theAmazon rainforest remain tribes that are somewhat protected from global society due to the natural barrier of naturally harsh conditions and the vast tributary system of theAmazon River.

A similar argument can be made regarding the world'sdeserts. Even with advanced technology, the lack of water and harsh temperatures make traversing and living in the world's deserts a journey for a relative few.[8] TheSahara is a prime example.

Fences

[edit]

Invented in the mid-1800s,chain-link fencing did not achieve major adoption until industrialized manufacturing began in the United States in 1898. Still in heavy use today, this relatively cost effective perimeter is popular due to its transparency, strength, storage, and ease of installation. From airports to school playgrounds, chain link fencing demand remains strong as a long-term perimeter solution. Fences alone can be easily circumvented via climbing, cutting, or digging, which has led to well known instances of perimeter breaches, such as at airports and a man scaling the fence at the US White House.

Most perimeter protection solutions in the past have been large-scale, stationary solutions. This causes a great challenge for today's mobile industry and military. With smaller, rapid deployment forces the norm for most of today's military engagements, large walls, high fences, and other permanent solutions aren’t always effective. Deployments inIraq andAfghanistan provide good examples.

MEMS

[edit]

MEMS technology can be used to enhance the effectiveness of fences' protection by incorporatingsensors that can detect changes in pressure, vibration, and other physical phenomena. Standing for "microelectromechanical systems",[9] they are tiny devices that combine mechanical and electrical components on a small scale. They can be used to create sensors that are small, lightweight, and highly sensitive to various physical inputs.

In the context of aperimeter fence,[10] MEMS sensors can be attached to the fenced area. These sensors could detect changes in pressure or vibration caused by someone attempting to climb over or cut through the fence. The sensors then transmit an alert to asecurity system, allowing security personnel to respond quickly to the attempted breach.

Overall, incorporating MEMS technology into a perimeter fence could provide significant benefits in terms ofsecurity, durability, and maintenance. As technology continues to advance, more innovative ways of using MEMS to enhance the security of our physical surroundings could be seen.

Electronic technology

[edit]

Beginning with the advent of electronic sensors, the concept of perimeter security evolved rapidly to include more modern, technological solutions.[11] This allows both private entities and governments to protect wider areas with less manpower involved. InWorld War II,radar was first introduced to detect airplanes, ships, and later ground targets.

Later,ground surveillance radar was coupled with steerable cameras that were automatically cued onto targets for quick evaluation of the threat. These systems were large and very expensive.

In the military, small force deployment has created complex perimeter protection problems. It has also created opportunities for innovation.Secure wireless communications, lightweight weaponry, faster transport, and portable perimeter protection have all become vital to the success of such missions.Compact surveillance radar (CSR) deployable in minutes provides temporary or portable perimeter security.[12]

While military applications have pressed the innovation for more mobile, affordable perimeter protection, today's security threats have triggered a wave of new products engineered to protect importantinfrastructure such as airports, bridges, harbors, dams, andelectrical substations. These products includethermal cameras, compact radar,microwave andradio wave fences, andbiometric scanning, most of which can be linked tosmartphone ortablet technology.

See also

[edit]
Wikimedia Commons has media related toPerimeter security.

References

[edit]
  1. ^Arata, Michael J. (2006).Perimeter Security. McGraw-Hill. p. 1.ISBN 978-0071589161.
  2. ^"Great Wall of China".History.com. 2010. Retrieved10 November 2015.
  3. ^"International Campaign to Ban Landmines – The Problem".www.icbl.org. ICBL. Retrieved2015-12-01.
  4. ^"The Ways of the Cowboy".www.ushistory.org. Retrieved2015-12-01.
  5. ^Tucker, Spencer C. (2015-07-28).Instruments of War: Weapons and Technologies That Have Changed History: Weapons and Technologies That Have Changed History. ABC-CLIO.ISBN 978-1440836558.
  6. ^Prackash, Om (2005).Cultural History of India. New Age International. pp. 3–4.ISBN 978-81-224-1587-2.
  7. ^"World Wars: The German Threat to Britain in World War Two". BBC – History. Retrieved2015-12-01.
  8. ^"The Lost Cities of Africa".www.oneworldmagazine.org. OneWorld Magazine. Retrieved2015-12-01.
  9. ^De Astis, Vincenzo; Dischi, Franco (2019).Manuale delle tecnologie di sicurezza. Assosicurezza. pp. 133–138.
  10. ^U.S. Nuclear Regulatory Commission."Perimeter Intrusion Alarm Systems"(PDF).U.S. Nuclear Regulatory Commission:1–20. Retrieved14 December 2020.
  11. ^"The 8 most significant ways physical security has evolved".CSO Online. 2014-01-21. Retrieved2015-12-01.
  12. ^"SpotterRF – Military Products".spotterrf.com. Archived fromthe original on 2016-03-04. Retrieved2015-12-01.
Retrieved from "https://en.wikipedia.org/w/index.php?title=Perimeter_security&oldid=1321474628"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp