Armaments Development – Defence Project

Classified *Please note that the company name can’t be made available due to it being a high-risk facility.

C3 Shared Services were contacted by an armaments development and defence organization to showcase our various technologies for a perimeter intrusion detection system. Multiple technologies were considered, including radar, fence detection systems, seismic detection systems and video analytics utilizing thermal cameras.

In-field tests were requested by the defence organisation and conducted at its high-risk facility for a period of approximately 12 months, to see how the different technologies would perform in adverse weather conditions and to determine which technology would best fit their unique site requirements. The facility is built on a high-lightning belt, which poses a threat to the sustainability of the security solution.


Having considered all the various technologies available on the market, the defence organization opted for thermal imaging cameras, combined with video analytics, as their perimeter intrusion detection system.

Throughout the proof of concept, the Opgal thermal cameras outperformed all its competitors due to the fact that these thermal imagers are robust and can function in the most daunting environmental conditions.

Needless to say, C3 was awarded the contract to install, configure, test and optimize the perimeter intrusion detection system via thermal cameras with analytics. The project also included the designing of the control and server rooms according to international best practice. C3 chose to customize the entire control room to ensure perfect working conditions, taking into account the ergonomically correct establishment for operators, as well as light levels and user interface.

Along with the complexities of installing the security equipment, designing the most effective protection system to mitigate lightning risk presented a new challenge.

The project for this military facility took more or less a year to complete, with the client challenging the systems, trying to breach the perimeter on a regular basis to ensure its effectiveness. The perimeter has, however, remained un-breached to date, and the detection system is still functioning optimally.