You are on page 1of 19

Intelligent Security Systems www.gvns.

ng

INTELLIGENT ESTATE SECURITY SOLUTIONS

INTRODUCTION:

The security situation in many parts of the world today leaves much to be desired.
In Nigeria particularly, the prevalence of armed robbers and other groups that constitute nuisance to
the society has led to the loss of lives and properties worth millions of dollars. Many of the attacks
that led to the loss have occurred in the homes or in guarded compounds and the attacks took place
in spite of the existence of seemingly impregnable security gates that were designed to ward off
intruders. The needs for electronically controlled gates, barriers and access control systems that have
superior security features to those operated manually thus exist and have been on the increase in
recent times.

This proposal is aimed at providing integrated, electromechanical systems for vehicular and
pedestrian control in and out of the estate zone.

In addition to Vehicular and Pedestrian Access Controls this proposal captures Intelligent Closed
Circuit TV systems, Aerial Surveillance and Security Drones, Street Lighting, Radio Communication
and Mobile Patrolling Systems.

1.0 SPIKES, BARRIERS AND ESTATE SECURITY


1
Intelligent Security Systems www.gvns.ng

Traffic Barrier: The SECTOR barrier has been designed to safely and cost-effectively apply high-

duty vehicular access control to roadways between three metres and six metres wide.

Traffic barriers offer a formidable means of controlling vehicular access, and we have gone to great

lengths to ensure that our barriers can handle the heaviest of traffic volumes while simultaneously

offering superior security and a myriad of features. We have also developed a range of ancillary

items that can be used to up the security ante more when used alongside our traffic barriers.

Roadway Spikes/Claws: CLAWS barrier spikes are designed to enhance the security at your high-

volume entry and exit points. They provide a formidable deterrent to would-be criminals and due to

their robust construction, they are very difficult to defeat.

Access Control System: Access control is a way of limiting access to a system or to physical or

virtual resources. In computing, access control is a process by which users are granted access and

certain privileges to systems, resources or information.

In access control systems, users must present credentials before they can be granted access. In traffic

control systems, these credentials may come in form of card, coin tag or remote controls, but

credentials that can't be transferred provide the most security.

2
Intelligent Security Systems www.gvns.ng

Project Cost Estimate: N15M

2.0 INTELLIGENT CCTV AND ESTATE SECURITY

3
Intelligent Security Systems www.gvns.ng

Owners of properties in residential estates often have a

false sense of security due to the estate already having a level of security with guards, electric fences

and the like. However, residential estates are increasingly being targeted by criminals and often

having a security company manage the residential estate is not enough.

Alarm systems and armed response can only provide a certain amount of protection to deter

intruders. For example, if an alarm is triggered, security personnel often only conduct perimeter

checks as they are unable to gain access to properties. Furthermore, by the time the guards arrive, it

is often too late and high value goods have already been stolen. This has highlighted the need for

remote monitoring of CCTV footage via mobile devices.

A CCTV solution with remote monitoring on Smart Phones, tablets or PCs should be a part of any

holistic security solution. Using this combination of tools along with intelligent integration with

alarms and other security devices allows owners of property in a residential estate to remotely view

their property. This offers greater peace of mind, tighter security and added return on investment

(ROI). In today’s world, with crime on the increase, CCTV solutions have gained popularity in the

residential security market. These cameras capture footage of what is happening at the property,

which can give a better indication of events when an intrusion occurs.


4
Intelligent Security Systems www.gvns.ng

However, CCTV alone is only useful after the fact, and is a reactive solution at best. The most

effective way to secure the property is to install an intelligent CCTV solution that enables remote

monitoring via mobile devices, allowing residents and home owners to ‘check in’ periodically or if

an alarm event is activated. With the correct placement of cameras, home owners can gain a full

view of every angle of the house and property, inside and out. When alarms do go off, the reason can

quickly be verified and instructions relayed to security personnel to ensure that the correct action is

taken. Each estate zone should be equipped with security cameras at every strategic entry and exit

points.

Project Cost Estimate: N2.5M

3.0 AERIAL SURVEILLANCE AND SECURITY

DRONES

Surveillance is the close observation of a person, group of people, behaviours, activities,

infrastructure, building etc for the purpose of managing, influencing, directing, or protecting. There

are several different methods of surveillance, including GPS tracking, camera observation, stake-

outs, data mining and profiling, and biometric surveillance among others.

5
Intelligent Security Systems www.gvns.ng

 Traditional observational surveillance methods are typically limited by the stationary nature of the

camera, which is usually handled manually or fixed upon a tripod or other structure. Aerial

surveillance can be performed using a helicopter; whilst this achieves the desired result, it is also

very costly.

Unmanned aircraft systems provide the ideal solution to the problems and limitations faced by other

surveillance methods. Drone surveillance presents an easier, faster, and cheaper method of data

collection, and a number of other key advantages. Drone planes can enter narrow and confined

spaces, produce minimal noise, and can be equipped with night vision cameras and thermal sensors,

allowing them to provide imagery that the human eye is unable to detect.

Project Cost Estimate: N5M

6
Intelligent Security Systems www.gvns.ng

4.0 TURNSTILES AND PEDESTRIAN SECURITY

7
Intelligent Security Systems www.gvns.ng

A turnstile is a gate usually made of metal that connects to a fence and only allows one person at a

time to enter. The horizontal bars on turnstiles make up the revolving “door” on the gate. Some

turnstile security systems have a place to swipe a badge to enter and others have a code. Facilities

can also have a guard present to easily monitor the people coming in and going out of the premises.

Nowadays, it is vital to guarantee safety in every possible way. Getting the best entrance control can

provide amazing support for establishments. For many years now, Security turnstile has helped all

types of establishments to guarantee safety. Security turnstiles should be obtained in order to offer

help when it comes to security.

Benefits of Installing Turnstiles

8
Intelligent Security Systems www.gvns.ng

 Turnstiles control the flow of people into premises which provides an excellent level of

safety allowing people to pass through at a controlled rate.

 Turnstiles control the flow of both residents and visitors into the estate.

 Turnstiles are a physical deterrent and barrier to stop people wishing to access an area,

without authority.

 It helps to reduce the number of people employed to guard and monitor the entrance and

exit of the gate.

 Computer-based software can provide important data and information to your turnstile

system, especially where the flow of people needs to be regulated or restricted.

Project Cost Estimate: N3M

9
Intelligent Security Systems www.gvns.ng

5.0 STREET LIGHTING AND CRIME


REDUCTION

Improved street lighting is widely thought to be an effective


means of preventing crime, second in importance only to increased police presence. Indeed, residents in
crime-ridden neighborhoods often demand that the lighting be improved, and recent research generally bears
out their expectation that improved lighting does reduce crime.

How Improved Lighting Could REDUCE Crime

In Darkness

1. Improved lighting deters potential offenders by increasing the risk that they will be seen or
recognized when committing crimes.
2. Police become more visible, thus leading to a decision to desist from crime.
3. If improved lighting leads to the arrest and imprisonment of repeat offenders they can no
longer commit crimes in the area.
4. New lighting can encourage residents to spend more time on their stoops or in their front
yards in the evenings and thus increase informal surveillance.
5. Improved lighting can encourage more people to walk at night, which would increase
informal surveillance.

In Daylight

10
Intelligent Security Systems www.gvns.ng

1. Improved street lighting helps to increase surveillance, ‘guarding’ locations and deterring

potential offenders.

2. New lighting shows that city government and the police are determined to control crime. As
a result, potential offenders might no longer see the neighborhood as affording easy pickings.
In additions, citizens might be motivated to pass on information about offenders.
3. Better lighting can increase community pride and cohesiveness, leading to a greater
willingness to intervene in crime and to report it.
4. If offenders commit crime in both light and darkness, nighttime arrests and subsequent

imprisonment would reduce both daytime and nighttime crime.

5. Better street lighting increases the risk of identification for offenders

Project Cost Estimate: N2.5M

6.0 RADIO COMMUNICATIONS AND SECURITY

11
Intelligent Security Systems www.gvns.ng

Many organizations and estates use security officers as a part of their overall security
program. These officers make routine patrols, respond to security incidents, and provide
other services to employees and to the general public. For security officers to work
effectively, it is essential that they have a good communications system in place. This system
needs to allow security officers to be summoned when their help is needed, as well as allow
communications between security officers as they carry out their daily activities.

Communications Options 

The two most common methods of security communications used today are the cell phone and the
two-way radio. In the past, pagers were also commonly used but have now been mostly replaced by
cell phones.

Security managers often have difficulty in deciding which communications devices should be issued
to security officers: should they issue cell phones, two-way radios, or both? Within this article, we
will discuss the advantages and disadvantages of both options and provide some ideas that may be
helpful when planning your security communications system. 

1. Two-Way Radios

12
Intelligent Security Systems www.gvns.ng

 Two-way radio systems have been used for business, public safety, and security communications for
more than fifty years. Prior to the introduction of cell phones, two-way radios were really the only
option when you wanted two-way communications with someone on the go. 

Two-way radios consist of two parts, a radio transmitter, and a radio receiver. These two parts are
combined into a single unit known as a radio "transceiver". There are three types of radio
transceivers: portable transceivers, mobile transceivers, and base station transceivers. The following
is a brief description of each transceiver type: 

 Portable Transceivers 

Portable transceivers, often called "walkie-talkies", are hand-held units that can easily be carried by
the security officer. These units are battery powered and have a self-contained speaker, microphone,
and antenna. External microphones and earphones can also be used. 

Portable transceivers typically have a range of between one and three miles depending on power,
frequency, and the type of obstructions between units. Range within concrete or steel buildings can
be considerably less.

 Mobile Transceivers 

Mobile transceivers are larger units that are designed to be mounted in vehicles. Mobile transceivers
have an external microphone that makes using the radio while driving more convenient. Mobile
transceivers are powered from the the vehicle's electrical system and typically transmit at a much
higher power than that used by portable transceivers. Mobile transceivers also have an external
antenna that is usually mounted on the roof or trunk of the vehicle. The combination of a higher
transmitting power and an external antenna gives mobile transceivers a much greater range than
portable transceivers; typically five to fifteen miles, depending on conditions. 

 Base Station Transceivers

13
Intelligent Security Systems www.gvns.ng

 Base station transceivers are designed to be mounted at a fixed location, such as at the security
command center. Base station transceivers typically operate at high power levels and use an external
antenna mounted on the roof of the building. Base station transceivers can be provided with desktop
microphones and speakers that can allow use of the radio from multiple locations in the security
command center. 

The typical security department would probably use a combination of transceiver types; portable
transceivers would be carried by security officers, mobile transceivers would be used in security
patrol vehicles, and a base station transceiver would be used at the security command center.

2. Cell Phones 

Cellular telephones ("cell phones") were first introduced about twenty-five years ago. Early cell
phones were bulky and expensive and only worked in limited areas. Today, cell phones are small,
convenient, relatively inexpensive and used by almost everyone from small children to senior
citizens. Many of today's cell phones are "smartphones" that in addition to being used to make calls,
can be used for email, text messaging, web browsing, listening to music and running application
programs. 

Unknown to many people, cell phones are actually a form of radio transceiver, This transceiver
transmits and receives low-power radio signals to and from nearby radio stations known as "cell
sites". These cell sites each cover a small geographic area and communicate with all of a given
service provider's cell phones within that area. In suburban areas, each cell site may cover an area of
several miles, while in dense urban areas each cell site may cover an area of a quarter-mile or less. 

All cell sites are connected to a central computer which manages communications between the cell
phones and the sites. As a user travels down the road using his cell phone, the computer keeps track
of the phone's location and automatically switches the cell phone to the nearest site. The computer

14
Intelligent Security Systems www.gvns.ng

can also adjust the phone's transmitting power so that an appropriate level of power is always used.
When someone dials a cell phone number, the central computer routes the call to the cell site nearest
to where the cell phone is located and rings the phone. 

Comparison between Two-Way Radios and Cell Phones 

Two-way radios and cell phones each have their advantages and disadvantages. Here is a brief
comparison of each option: 

Two-Way Radios 

ADVANTAGES 

 Simple and easy to use.


 Rugged and reliable - suitable for use in outdoor and heavy industrial environments.
 Loud audio output - suitable for use in noisy areas.
 Available with many accessories designed specifically for security use.
 Allows "one-to-many" communications - all officers can hear all communications. Very
beneficial when many officers are involved in responding to the same security incident. Also
provides officers with overall awareness of what is happening on the campus.
 System is completely owned and operated by the organization.
 System can continue to work during times of crisis (earthquake, tornado, etc.) that may
overwhelm public cell phone network.
 Less opportunity for misuse by security officers.
 No ongoing fees for cell phone service or airtime. 

15
Intelligent Security Systems www.gvns.ng

DISADVANTAGES 

 Requires initial capital investment for radios, licensing and installation.


 Must install and maintain own infrastructure (antennas, repeaters, emergency power, etc.)
 Limited coverage - only works in designated areas. Generally can't be used away from
campus.
 No ability to make or receive telephone calls (a).
 No ability to use for text messaging, email, or web browsing.
 No ability to use with security monitoring applications (guard tour, remote video viewing,
etc.).
 Easy for outside parties to eavesdrop on security communications using radio scanner

Cell Phones 

ADVANTAGES 

 Little or no initial capital investment (with 2-year service commitment)


 No need to install and maintain infrastructure (antennas, repeaters, emergency power, etc.)
 Wide coverage - works anywhere cell service is available.
 Ability to make or receive calls to and from any telephone.
 Ability to use for text messaging, email, or web browsing.
 Ability to use with security monitoring applications (guard tour, remote video viewing, etc.).
 Difficult for outside parties to eavesdrop on security communications using radio scanner. 

DISADVANTAGES 

 More complicated to use.


 Generally, less rugged and reliable than radio units. May not last long in outdoor or heavy
industrial environments.
 May be difficult to use in noisy areas.
 Few accessories designed specifically for security use are available.

16
Intelligent Security Systems www.gvns.ng

 Higher potential for misuse by security officers. Officers may make personal calls, text, or
participate in social media activity while on duty.
 Only allows "one-to-one" communications (c) - security officers can't hear communications
between other officers. Awkward when multiple officers are involved in responding to the
same security incident. Deprives officers of overall awareness of what is happening on the
campus.
 Reliant on outside party (cell phone service provider) for operation of the system.
 Public cell phone network can be overwhelmed during times of crisis (earthquake, tornado,
etc.). Service may not be available at times when it is needed most.
 Ongoing fees for cellular service and airtime.

Conclusions and Recommendations

It is our opinion that the simplicity, ruggedness, and reliability of two-way radios make them
the best choice for security officer communications in most situations. Just as law
enforcement and other public service agencies continue to use two-way radios, we feel that
most security departments are still best served by using two-way radios over other
communications devices. 

The only exception is very small organizations where there may only be one security officer
on duty at a time. In these cases, a cell phone is probably the only communications option
that makes sense.

Project Cost Estimate: N4.3M

7.0 MOBILE PATROL AND SECURITY

Mobile patrol is basically meant to offer security presence for exact time span unlike static
security guards who are entrusted with the responsibility to keep an alert eye for 12 hours on

17
Intelligent Security Systems www.gvns.ng

the premises and those who are moving around. When you are availing mobile patrol service
one leading deputy along with his subordinates will come in a security van which is not like
regular vans. They take round of all important areas to make sure that nothing offensive is
going on and everything is in exact order.

Now you must be wondering, what are the benefits of having mobile patrol? Well, such
patrolling offers flawless security and support to the security guard if by any chance, he is
tormented or ambushed  by criminals or become subjected to their brutality. These patrols are
like visual determent, which spreads an air of surveillance, and offenders who are indulging
in a thought that they are free to do anything anywhere, will be curbed in restriction.

Seeing the patrolling guards, criminal and law breakers will get the idea that their happy days
are gone and they have to find some other premises. Potential swindlers and burglars never
dare to mess with mobile patrols and wonderful fact about these patrols is that they are
unpredictable and their visiting is entirely unplanned.

18
Intelligent Security Systems www.gvns.ng

So, how do they differ from traditional guards? The manned or static guard after taking a
stroll comes back to his own place or base of operations. On the other hand, patrolling
officers first visit your site, inspect thoroughly every nook and cranny and then make their
way to other customer’s store or residential area. They won’t sit anywhere although they
keep sharp eye on your premises.

They are often armed and the officers taking a round are well-bodied and professionally
trained, having good presence of mind. Their reflex action is also commendable and their
senses work pretty fast. Their razor-sharp vision catches all type of absurdity in an instant.

Today, a number of businesses are opting for mobile patrols as they are user-friendly, time
saving, beneficial and cost effective a choice and they are also effective in reducing problems
such as Theft of IT equipment, break-ins, vandalism and vehicle theft. Those business
owners who are desirous to dispense their service in a safer environment without any doubt
would go with this service as it is highly cost effective a security solution.

Many service providers offer patrol customization facility. So, you will be the one to decide
how many patrols you need, whether it is two, three or four. No matter how perilous and
risky the area is, you won’t be requiring more than 6 patrols.

You must not think much about money and decide to compromise on security, as it is said
better service charges better  price so when it is about your protection and safeguard don’t be
skeptical in spending few bucks more.

Project Cost Estimate: N58M

19

You might also like