Perimeter Security

Total Page:16

File Type:pdf, Size:1020Kb

Perimeter Security Perimeter Security Michael J. Arata, Jr. McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. 0-07-158916-3 The material in this eBook also appears in the print version of this title: 0-07-146028-4. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trade- marked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. For more information, please contact George Hoare, Special Sales, at [email protected] or (212) 904-4069. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill’s prior consent. You may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your right to use the work may be terminated if you fail to comply with these terms. THE WORK IS PROVIDED “AS IS.” McGRAW-HILL AND ITS LICENSORS MAKE NO GUARANTEES OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE WORK, INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK OR OTH- ERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-Hill and its licensors do not warrant or guarantee that the functions contained in the work will meet your requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill nor its licensors shall be liable to you or anyone else for any inaccuracy, error or omission, regardless of cause, in the work or for any damages resulting therefrom. McGraw-Hill has no responsibility for the con- tent of any information accessed through the work. Under no circumstances shall McGraw-Hill and/or its licensors be liable for any indirect, incidental, special, punitive, consequential or similar damages that result from the use of or inability to use the work, even if any of them has been advised of the possibility of such damages. This limitation of liability shall apply to any claim or cause what- soever whether such claim or cause arises in contract, tort or otherwise. DOI: 10.1036/0071460284 Professional Want to learn more? We hope you enjoy this McGraw-Hill eBook! If you’d like more information about this book, its author, or related books and websites, please click here. DEDICATION This book is dedicated to my wife, Karla, for putting up with me during the writ- ing of this book; and to my daughter, Kristen; and son, Jimmy, without whose patience and understanding of late nights and weekends spent writing and rewrit- ing, this book would not have been possible. ACKNOWLEDGMENT Thank you Victoria Roberts of Lone Wolf Enterprises for the excellent, expert job you did in editing and guidance; without it this project would not have been possible. ABOUT THE AUTHOR Michael Arata has over 15 years of security experience that includes positions from manager to vice president and consultant. He has developed and managed successful security programs from the ground up for several large organizations including the Director of Corporate Security for a major West Coast construc- tion company. He holds a master’s degree in Public Administration, a B.A. in Business/Pub- lic Administration, and a B.S. in Safety and Fire Protection Technology. He has attended numerous seminars and training programs relating to security and holds CISSP, CPP, CFE and ACLM, professional certifications. He has spoken at various professional organization seminars on the subject of security and written articles about security for trade publications. He has guest lectured at the Oklahoma State University and the University of California, Berkeley on safety and security related subjects. He is an adjunct instructor of Criminal Justice at a local college. Copyright © 2006 by The McGraw-Hill Companies, Inc. Click here for terms of use. For more information about this title, click here Contents CHAPTER 1 INTRODUCTION . 1 Berms and Ditches . 59 CHAPTER 2 THREAT ASSESSMENT AND RISK ANALYSIS Design Considerations for Protective Barriers . 59 BASICS . 5 Conclusion . 60 How to Do a Threat Assessment . 6 CHAPTER 5 SECURITY LIGHTING . 61 Identify the Risks . 7 Foot-Candle Power . 63 Analyze the Risk for Probability of Occurrence . 8 Categories of Security Lighting . 63 Calculating the Cost of a Loss . 10 Types of Lamps (Luminaries) . 64 The Survey Form . 11 Types of Security Lighting . 65 The Crime Statistics . 22 Lighting Requirements for Perimeter Protection . 65 Risk Analysis Steps . 24 Lighting Requirements for CCTV . 68 Choosing the Method to Mitigate the Risk . 26 Electrical Power Sources for Security Lighting . 69 Planning and Designing . 29 Wiring and Lighting Controls . 70 CHAPTER 3 PERIMETER FENCE . 33 Maintenance of Lighting Systems . 71 Types of Perimeter Fences . 34 Security Lighting Design Considerations . 71 Chain Link . 35 Conclusion . 73 Wrought Iron . 37 CHAPTER 6 ELECTRONIC ACCESS CONTROL . 75 Wood Fences . 39 Biometric Systems . 75 Concrete Walls . 41 Hand Geometry . 76 Fence Openings . 41 Fingerprint Reader . 76 Barbed Wire . 43 Iris Scanner . 76 Razor Wire . 44 Retina Scan . 77 Fence Design Specifications . 45 Voice Recognition . 77 CHAPTER 4 PROTECTIVE BARRIERS . 49 Signature Recognition . 77 Natural Protective Barriers . 50 Facial Recognition . 77 Man-Made Protective Barriers . 51 Error Rates . 78 Decorative Planters . 52 Combination Systems . 78 Bollards . 53 Access Control System Cards . 78 K-Rail . 55 Magnetic Strip . 78 Welded Steel Guard Rails . 56 Proximity Cards . 80 Vehicle Arrest Systems . 57 Smart Cards . 80 iv Contents v Dual Technology Cards . 80 Parking Garages . 143 Designing the Access Control System . 80 Natural Access Control . 143 Types of Access Control System Locks . 82 Natural Surveillance . 145 Request to Exit Device (REX) . 84 Traditional Physical Security . 147 Door Contacts . 85 Access Control . 149 Automatic Door Closer . 85 Security Officers . 149 Access Control System Panels . 86 Security Survey . 149 Sample Design Specifications . 86 Parking Lots . 150 CHAPTER 7 ALARMS (INTRUSION DETECTION Lighting in Parking Lots . 151 SYSTEMS) . 101 Landscaping in Parking Lots . 152 Alarm Categories . 102 CCTV in Parking Lots . 152 Exterior Intrusion Detection Sensors . 102 Emergency Call Boxes . 153 Interior Intrusion Detection Sensors . 103 Security Officers . 153 Sensor Technology . 103 Sample Design Specifications for a Parking Garage . 153 Switches . 104 CHAPTER 9 CLOSED CIRCUIT TELEVISION (CCTV) . 159 Magnetic Switches . 104 CCTV System Components . 160 Balanced Magnetic Switches . 105 Camera . 161 Mechanical Switches . 106 Coaxial Cable . 163 Volumetric Sensors . 107 Fiber Optic Cable ..
Recommended publications
  • POETRY OFFERINGS from David W. Mitchell
    1 POETRY OFFERINGS from David W. Mitchell 2 Photography of David Mitchell by Ken Roberts Cover photography by Jeremiah Trilli Line drawing by Summer Breeze Published by Motherbird Books Silver City, New Mexico motherbird.com © David W. Mitchell 2008 3 Index A Dark Hole In Time . 8 A Gift . 9 A Lovely Day for Borscht Fish . 10 A Modern Carollette for Dodgson . 11 Abroad Among the Limbless . 12 Adagio in Zzzzz Minor . 13 Afternoon of a Biblioparadisiac . 14 Ah Dylan, Dylan . 15 An Olympian Lesson . 16 Apostatic Succession . 17 Ballad of Saint Louis, the Unfrocked Cardinal 18 Belle Ardoise I, The . 20 Blatissimus . 21 Blue Writer, The . 22 Carmel I . 23 Carmel II . 25 Chelsea . 27 Compass Rose and the Gypsy Will . 28 Compendium Humanum . 29 Concertina in F-Stop Major . 31 Critique . 32 Cursive Reclaimed . 33 Cutting Corners I; Cutting Corners II . 34 Departure of Roses, The . 35 Diasporulation . 36 Disappearance . 37 Drizzle . 38 Doubling Duplicity . 39 Eleven Red-Haired Men . 40 Encampment, The . 41 Epitaph for Floyd . 42 Fangs . 43 Father Time Contemplates Mass . 44 4 Fingersongs- I . 45 For Edna, and John, and All . 46 For Jessica and the Williams . 47 For Mimi Farina: Bread and Roses . 51 From A to Z and Back Again . 52 Goulashification . 53 Heard On the Concertina Wire . 54 Helicocochoidal Figmentation. 55 Hexing the Circle . 56 Hillock and the Holly, The . 57 How I knew What to Do . 59 In Praise of Thumbs . 60 In Praise of Thumbs II . 61 In the Mailstrom . 63 In Sacramental Jeans . 64 Infinite Regress of Dawn, The .
    [Show full text]
  • Notice of Public Meeting City of Albany City Council
    NOTICE OF PUBLIC MEETING CITY OF ALBANY OUR MISSION IS CITY COUNCIL “Providing quality public services Council Chambers for a better Albany community.” 333 Broadalbin Street SW Wednesday, March 9, 2011 OUR VISION IS 7:15 p.m. “A vital and diversified community that promotes a high quality of life, AGENDA great neighborhoods, balanced economic growth, and quality public services.” Rules of Conduct for Public Hearing 1. No person shall be disorderly, abusive, or disruptive of the orderly conduct of the hearing. 1. CALL TO ORDER 2. Persons shall not testify without first receiving recognition from the presiding officer and stating their 2. PLEDGE OF ALLEGIANCE TO THE FLAG full name and residence address. 3. No person shall present irrelevant, immaterial, or 3. ROLL CALL repetitious testimony or evidence. 4. There shall be no audience demonstrations such as 4. SCHEDULED BUSINESS applause, cheering, display of signs, or other conduct disruptive of the hearing. a. Legislative Public Hearing 1) Development Code Amendments. [Pages 1-28] a) DC-06-10, amending Ordinance No. 4441, which adopted the City of Albany Development Code and Zoning Map by amending the Development Code text related to allowing electric fences in the Light Industrial and Heavy Industrial zones, allowing barbed wire on livestock fencing, and clarifying the fencing standards, adopting findings, and declaring an emergency. [Pages 1-23] Action: ____________________________________________________________ ORD. NO.__________ b) DC-01-11, amending Ordinance No. 4441, which adopted the City of Albany Development Code and Zoning Map by amending the Development Code text related to providing an alternative perimeter landscaping plan when landscaping can be placed in excess public right-of-way, adopting findings, and declaring an emergency.
    [Show full text]
  • Handbook on USSR Military Forces, Chapter VI: Fortifications War Department (USA)
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln DOD Military Intelligence U.S. Department of Defense 1-1946 Handbook on USSR Military Forces, Chapter VI: Fortifications War Department (USA) Robert L. Bolin , Depositor University of Nebraska-Lincoln, [email protected] Follow this and additional works at: http://digitalcommons.unl.edu/dodmilintel War Department (USA) and Bolin, Robert L. , Depositor, "Handbook on USSR Military Forces, Chapter VI: Fortifications" (1946). DOD Military Intelligence. 27. http://digitalcommons.unl.edu/dodmilintel/27 This Article is brought to you for free and open access by the U.S. Department of Defense at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in DOD Military Intelligence by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. Technical Manual, TM 30-430 Handbook on USSR Military Forces Chapter VI Fortifications Robert L. Bolin, Depositor University of Nebraska-Lincoln, [email protected] Technical Manual, TM 30-430, Chapter VI 1 January 1946 Handbook on USSR Military Forces Chapter VI Fortifications War Department Washington, DC Comments The copy digitized was borrowed from the Marshall Center Research Library, APO, AE 09053-4502. Abstract TM 30-340, Handbook on USSR Military Forces, was “published in installments to expedite dissemination to the field.” TM30-430, Chapter VI, 1 January 1946, “Fortifications,” is a detailed discussion of earthworks and structures used for defensive purposes. This chapter is illustrated with numerous drawings, diagrams, and charts. This manual is listed in WorldCat under Accession Number: OCLC: 19989681 1 Jan 46 TM 30-430 CHAPTER VI FORTIFICATIONS TABLE OF CONTENTS Page Figure Section I.
    [Show full text]
  • Field Fortifications Engineer Subcourse 65
    SUBCOURSE EDITION EN0065 B FIELD FORTIFICATIONS ENGINEER SUBCOURSE 65 FIELD FORTIFICATIONS CORRESPONDENCE COURSE PROGRAM U. S. ARMY ENGINEER SCHOOL FORT LEONARD WOOD, MO INTRODUCTION Field fortifications are natural or manmade protective features used as defensive obstacles, personnel and weapons shelters, and protected firing positions. This subcourse teaches you how to construct personnel, vehicle, and weapons emplacements, intrenchments, shelters, entanglements, and obstacles under various climatic conditions. Standard plans, types of material, construction procedures, and estimated time and labor requirements are also given. The subcourse consists of five lessons and an examination as follows: Lesson 1. Purpose and Requirements of Field Fortifications. 2. Trenches, and Fieldworks. 3. Obstacle Employment. 4. Barbed Wire Entanglements. 5. Camouflage (Protection Against Enemy Surveillance). Examination. Fifteen credit hours are allowed for this subcourse. The format of this subcourse has been developed to facilitate student self-pacing and self-testing. Each lesson in this subcourse is followed by a number of Self-Test questions and exercises designed for a review of that lesson. After completing study of the lesson, you should answer the Self-Test exercises, then turn to the back of the subcourse booklet where the correct answers to the Self-Test have been included. A comparison of your answers with those given in the back of the subcourse will indicate your knowledge and understanding of the material presented. When you have completed all lessons to your satisfaction, complete and forward the Examination Answer Card which you will find in the subcourse packet. The grade you receive on the examination is your grade for the subcourse. * * * IMPORTANT NOTICE * * * THE PASSING SCORE FOR ALL ACCP MATERIAL IS NOW 70%.
    [Show full text]
  • Razor Wire Endangers Wildlife at U.S.-Mexico Border, Environmentalists Say by Patrick Timmons
    https://www.upi.com/Razor-wire-endangers-wildlife-at-US-Mexico-border-environmentalists- say/9191552583926/ Razor wire endangers wildlife at U.S.-Mexico border, environmentalists say By Patrick Timmons MEXICO CITY, March 15 (UPI) -- Razor wire newly laid at the U.S.-Mexico border endangers gray wolves and rare jaguars because it cuts them off from food, water, shelter and mating partners, environmentalists said. Since November, troops have laid 210 miles of the razor wire, dividing the border region to deter migrants from unlawfully entering the United States from Mexico. "It's a decidedly effective barrier. The wire has razor sharp edges. It would stop people and animals. It's ugly that we have gotten to this point," said Montana state Sen. Mike Phillips, D-Bozeman, a conservation scientist who directs the Turner Endangered Species Fund. Phillips has worked for more than 30 years to save the Mexican gray wolf from extinction. There are about 114 of these wolves in the wild across northern Mexico and the southwestern United States, according to the conservation nonprofit Defenders of Wildlife of Washington, D.C. "Any barrier, wall or fence that would stop a person is going to stop a wolf. People are more resourceful than wolves. A wolf is not going to dig a tunnel," Phillips said. "When species numbers are so low, that's when connectivity becomes really important," Phillips said. With connectivity blocked by border barriers, animals inbreed and genetic diversity suffers, threatening species survival, he said. 'What gets up doesn't get over' RELATED Border wall threatens nature tourism industry in South Texas Concertina razor wire is folded in a flattened coil to facilitate installation.
    [Show full text]
  • Barbed Wire Museum
    Barbed Wire Museum An Interactive Qualifying Project Report Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree of Bachelor of Science Submitted by: Alex Kuang February 28, 2011 Major Advisor: Professor James Dempsey Abstract The previous attempt at a barbed wire website detailing the importance of barbed wire to the economical and industrial development of Worcester, the North Works site, was full of errors and sparse in information. This project attempts to remedy this by improving the website’s aesthetic appearance, fixing the grammatical and coding errors, adding to the existing information, and establishing groundwork for future expansion. The result is a much cleaner looking site hosted on the WPI network, ready to be augmented by content created by future students. Contents Introduction . 3 Methodology . 4 Essay - The Devil’s Rope: Barbed Wire and Conflict . 6 Works Cited . 7 Documentation For Future Students . 8 Conclusion and Recommendations . 10 Appendix A: build.py . 11 Appendix B: header.html . 13 Appendix C: footer.html . 15 Appendix D: barbedwire.html . 16 Appendix E: bib.html . 17 Appendix F: bw glossary.html . 20 Appendix G: contacts.html . 23 Appendix H: essays.html . 24 Appendix I: history.html . 25 1 Appendix J: index.html . 31 Appendix K: nw gallery.html . 32 Appendix L: nw intro.html . 33 Appendix M: people.html . 35 Appendix N: conflict.html . 38 2 Introduction The development of barbed wire had a major impact on the development of the city of Worcester. The revenue brought in by the North Works factory contributed to the economic devel- opment of Worcester; in fact, the founder of the North Works factory, Washburn, would later go on to become one of the greatest donors of Worcester Polytechnic Institute.
    [Show full text]
  • Statement of Work (Sow)
    NATO UNCLASSIFIED JUNE 2019 NATO UNCLASSIFIED STATEMENT OF WORK (SOW) CP 9A1101 NATO Response Force (NRF) Assets and Support Project: 5HQ27106 Passive Force Protection 6 JUNE 2019 NATO UNCLASSIFIED THIS DOCUMENT IS THE PROPERTY OF NSPA AND MAY NOT BE COPIED OR CIRCULATED WITHOUT AUTHORIZATION NATO UNCLASSIFIED THIS DOCUMENT IS THE PROPERTY OF NSPA AND MAY NOT BE COPIED OR CIRCULATED WITHOUT AUTHORIZATION TABLE OF CONTENTS 1 INTRODUCTION .................................................................................................................................................... 5 1.1 PURPOSE ............................................................................................................................................................... 5 1.2 SCOPE ................................................................................................................................................................... 5 1.3 DEFINITIONS AND CONVENTIONS ................................................................................................................................ 5 1.4 CONTRACTOR’S RESPONSIBILITIES ............................................................................................................................... 6 2 GENERAL REQUIREMENTS .................................................................................................................................... 7 2.1 PROJECT OBJECTIVES ..............................................................................................................................................
    [Show full text]
  • USACE Access Control Point (ACP); Market Research Report
    US General Services Administration - USACE Access Control Point (ACP); Market Research Report 1 Please note this version of the market report differs than the report provided to the client as we have removed industry partner responses who did not authorize sharing on the Acquisition Gateway. The summary totals are accurate. This market research report summarizes the results of a request for information (RFI) issued to Schedule 03FAC SIN 811 002 to understand their capabilities in regards to the Army Access Control Point (ACP) requirements. The RFI was issued by the US General Services Administration (GSA) on behalf of the US Army Engineering and Support Center (HNC), Huntsville, AL on June 19, 2018. Responses were due by August 31, 2018. The report does not draw technical conclusions in regards to the Army ACP requirement and the industry response. While GSA does not draw technical conclusions, we are confident the Army will receive adequate competition under GSA Schedule 03FAC. Additionally, the results of the research also demonstrate the possibility of a small business under Schedule 03FAC. However, GSA is unable to make this statement definitively as we have not reviewed the technical capabilities as the Army is the technical expert in relation to this requirement. A summary of the total responses is below. Overall, the RFI yielded 23 responses and demonstrates the best in class nature of GSA Contracts. Please note, that while 23 responses were received, 21 were interested in responding if an RFQ would be posted and 19 allowed GSA to publish their info on the Gateway. GSA believes the Army can be confident it will achieve its mission goals, competition goals and socio-economic goals under Schedule 03FAC.
    [Show full text]
  • ATTP 3-39.32 (FM 3-19.30) Physical Security
    ATTP 3-39.32 (FM 3-19.30) Physical Security August 2010 DISTRIBUTION RESTRICTION. Approved for public release; distribution is unlimited. Headquarters, Department of the Army This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). *ATTP 3-39.32 (FM 3-19.30) Army Tactics, Techniques, and Procedures Headquarters No. 3-39.32 (FM 3-19.30) Department of the Army Washington, DC, 3 August 2010 Physical Security Contents Page PREFACE............................................................................................................... v INTRODUCTION .................................................................................................. vii Chapter 1 PHYSICAL SECURITY CHALLENGES ............................................................ 1-1 Physical Security and the Protection Warfighting Function ................................ 1-1 Forms of Protection ............................................................................................ 1-1 Principles of Protection ....................................................................................... 1-2 Protection Tasks and Systems ........................................................................... 1-3 Physical Security Officer ..................................................................................... 1-6 Chapter 2 PHYSICAL SECURITY PLANNING .................................................................. 2-1 Planning Process ...............................................................................................
    [Show full text]
  • Military Police Internment/Resettlement Operations
    Military Police Headquarters, Department of the Army This publication is available on the General Dennis J. Reimer Training and Doctrine Digital Library at *FM 3-19.40 (FM 19-40) Field Manual Headquarters NO. 3-19.40 Department of the Army Washington. DC. 1August 200.1 Military Police InternmentlResettlement Operations Contents Page PREFACE .................................................................................................................... v PART ONE FUNDAMENTALS OF INTERNMENTIRESETTLEMENT OPERATIONS Chapter 1 INTRODUCTION...................................................................................................... 1-1 Procedures............................................................................................................... 1-1 Definitions................................................................................................................. 1-2 Objectives ................................................................................................................ 1-5 Agencies................................................................................................................... 1-6 Protection of Captives and Detainees .................................................................... 1-11 Protection of Enemy Prisoners of War and Civilian Internees ............................... 1-12 Protection of Refugees ........................................................................................... 1-13 Chapter 2 COMMANDER AND STAFF RESPONSIBILITIES .................................................2-1
    [Show full text]
  • The Battle for Buttons
    The Battle for Buttons November 4, 1969 FIND THE BASTARDS THEN PILE ON COL George S. Patton, III, 39th Colonel of the Regiment, mandated that this slogan, “Find The Bastards, Then Pile On,” be painted in Cavalry yellow on every hatch cover in the regiment. Ty Dodge 2701 Overhill Road Birmingham, AL 35223 205-870-0009 [email protected] Revised July 2006 Unpublished work © 2004 & 2006 Ty Dodge THE BATTLE FOR BUTTONS Ty Dodge 2004 PREFACE Imagine that it’s sunset and you’re standing at the rim of the Grand Canyon. It’s an awesome sight, truly beyond description. In your hands you hold a four-dollar, throw-away camera. You snap a picture. Thirty-five years later you pull that faded photo from an old trunk and show it to a friend, trying to help him understand the awesome majesty of the Canyon. He yawns. It’s nearly impossible for him to capture the grandeur of that moment thirty-five years ago. And, frankly, he doesn’t give a rip. So you stuff it. Now imagine that as a young man you rode with The Blackhorse in Vietnam, sharing that most significant experience with a handful of other Blackhorse troopers. Then you DEROSed back to an America that, frankly, didn’t give a rip. And so, you stuffed it. How could you possibly explain it, anyway? In the years to come, Vietnam lay hidden away in a far-off corner of your mind. Every now and then you tried to share the experience, but each telling was an exercise in frustration.
    [Show full text]
  • Total Fence, Has Been Serving • Excellent Service Customers in India Since 1989
    MANUFACTURERS SERVICES FABRICATION SHIPPING Total Fence, has been serving • Excellent Service customers in India since 1989. We At Total Fence we serve all your provide Fencing throughout India,and needs,Our priority is to ensure that offer a wide range of fencing products your property is secure, We guide our customers to choose the right type of and services. We are reputed for fence taking into consideration all working on large-scale complex projects factors that can lead to breaching of such as High Security detention fencing, security. highway Tubular Rail, W Beam Crash • Easy and Fast Installation Barrier fencing. We take great care in providing enclosures and routine repairs Total Fence is equipped with trained staff who have vast experience in at moderate rates. At Total Fence we fence construction.Our staff are are equipped with highly experienced experts in completing the work at fencing professionals who prioritize on professional standards,And our sup- port team ensures efficient project our motto of delivering best Quality management and completion of proj- Service to our customers. We strive WHY? ects on time. hard for customer satisfaction. Total • Reliable and Cost-Effective ABOUT Fence designs and installs high quality commercial fencing security solutions When it comes to improvements on for your property. We are known for our your property, We offer a wide variety high-quality,fair pricing and we are of fencing products, and assure quality services at affordable prices. primary suppliers of commercial fencing We are equipped to meet all your services to several regions. The fencing needs. company is located at an accesible location to our customers.
    [Show full text]