Tailgating Detection at Remote Facilities

Eric Olson, Vice President of Marketing
PureTech Systems

An important aspect of protecting critical facilities is managing the movement of people to and from areas for which they have authorized access.  Utilities and remote facilities have the added complication that many of these areas may be remote, and potentially unmanned.  Some form of security system in typically in place to help manage this access, however, one of the biggest weaknesses of a typical access control system is the fact that it can control opening a door or gate when an access card is presented, but cannot actually control how many people or vehicles enter the building or site location behind the authorized card holder.  Fortunately, there are many deterrents and detection solutions to address the gate violation problem of “tailgating.”  One such solution, is tailgate detection utilizing intelligent video. 

What is Tailgating?
Tailgating can occur at any type of entrance, such as a building exterior entrance, access to a room or a roadway entrance into a remote site.  Both vehicles and humans can be the cause of the tailgate event.   For the sake of brevity, let’s limit our discussion to the issue of tailgating at a gated vehicle entrance, understanding that there are many other locations and situations where tailgating can occur.

From a pure definition standpoint, the problem actually has two forms; tailgating and piggybacking.  Piggybacking is a situation when an authorized vehicle accesses a restricted area, and intentionally allows another vehicles or person to enter.  This could be out of courtesy, or they may recognize the second vehicle / person and consider them authorized for entry.

The second form of the problem is “tailgating.”  Tailgating occurs when a person or vehicle follows an authorized vehicle into the secured area without the knowledge of that authorized person. This typically occurs by entering the area after the authorized vehicle has left the area, but the gate is still in an open state

The nuances between the two definitions are important for corporate security policy and communications, but from a video detection standpoint, both can be treated the same and the terms are used interchangeably. 

The Cost of Non-Compliance
Tailgating and piggybacking carry both tangible and intangible costs.  They include loss due to equipment or intellectual property theft; cost of vandalism, physical loss and emotional impacts of workplace violence; financial penalties or business restrictions from failing to comply with security regulations, costs from compromised safety conditions and the intangible effect of complacency.   For electrical and power generating facilities subjected to NERC CIP-014, tailgating is a potential physical vulnerability which falls under Requirement R5.1.

Tailgate Detection System using Video Analytics

Tailgate Detection System using Video Analytics

Tailgate Detection Using Video Analytics
There are many solutions capable of detecting or deterring tailgating.  One such solution is the use of intelligent video.  In the case of a vehicle entrance, a camera is mounted in a location where it can see the entrance.  The video is then made available to an intelligent video algorithm, which may reside in the camera or in a small edge device or computer.  The algorithm has the capability of analyzing the video in real time for the occurrence of people and vehicles that pass through the entrance.  By adding information from the access control system, the algorithm can identify and provide alarms for tailgating events.

The underlying premise of the algorithm is the detection of more than one target passing through a defined entrance area for a single “authorized” event.  Events can include:

  • A vehicle entering directly behind an authorized vehicle,
  • A vehicle entering after an authorized vehicle has entered/exited and moved away from entrance,
  • A vehicle entering while an authorized vehicle is exiting, or
  • A person (non-passenger) entering with an authorized vehicle.

It is important to note that it is not necessary to integrate the intelligent video capability with an enterprise level access control system, consisting of badges and credentialing.  For those sites where authorized access is managed by possession of an appropriate key or a similar system, a simple contact on the gate can be used by the video analytics as an entrance event to detect tailgating. 

Successful systems cover a view that encompasses multiple forms of tailgating or piggybacking

Successful systems cover a view that encompasses multiple forms of tailgating or piggybacking

Keys to Success
Video-based tailgate detection is extremely flexible in terms of installation options, but there are some keys to ensure performance of the system.

A view of the entire entrance –  Successful systems cover a view that encompasses multiple forms of potential tailgating or piggybacking.  This may include a vehicle entering via the opposing lane, or a person slipping in very close to edge of the entrance.  Ensuring the video encompasses this entire region can eliminate missed intrusions.

A view perpendicular to entrance – Often times tailgating or piggybacking, can occur in very close proximity to the authorized vehicle.  As such, having a view perpendicular to the entering vehicle allows for imaging the gap between targets.  This gap, along with object classification techniques, can then be used by the algorithm to understand the difference between two vehicles in close proximity, versus a large truck.

Proper mounting height – If opposing tailgating (e.g. a vehicle attempts to enter, while an authorized vehicle is exiting) or side-by-side tailgating (e.g. a vehicle attempts to enter alongside an authorized vehicle) are concerns, the camera should be placed high enough so one vehicle does not obstruct the other, allowing the video analytics to easily detect the existence of multiple targets.

Advantages of Intelligent Video

The use of video in detecting tailgating is advantageous for several reasons:

  • Easy add-on to existing gates and entrances.
  • Does not require an enterprise level access control system to be effective
  • Highly accurate in detecting both tailgating and piggybacking,
  • Unobtrusive in appearance, and can double as a visual deterrent
  • Accommodates various sized vehicles
  • Does not require separate emergency exit, as do some deterrent measures
  • Relatively inexpensive.  It can be an extension of an existing security system and can be installed using wireless and solar power methods.
  • Doesn’t require constant monitoring/streaming – Alarms are sent are conditions arise. 
All security assessments should consider piggybacking / tailgating vulnerabilities.

All security assessments should consider piggybacking / tailgating vulnerabilities.

Summary
Tailgating and Piggybacking are common security issues faced by every institution.  It is especially problematic for utilities and other companies with remote sites and facilities.  Further complicating the matter is the idea that allowing such an event to occur often happens out of simple act of courtesy by an authorized entrant.  These events carry with them the high potential of tangible and intangible costs, from a security and a safety aspect. Solutions do exist for both deterrence and detection, including the use of video analytics.  Implementation of a video based solutions is flexible, reliable, detects various forms of the intrusion and can be installed affordably.  Regardless of the type of solution selected, all security assessments should consider the piggybacking / tailgating vulnerabilities, and have a solution in place to address.

You can learn more about protecting critical facilities in this white paper.

Eric Olson is Vice President of Marketing at Phoenix-based video analytics developer PureTech Systems.  Contact him at eric.olson@puretechsystems.com or via twitter @puretechsystems.

Comments are closed.