Perimeter Security A Holistic Approach. Why Perimeter Security? Review the Basics Consider site specific needs Evaluate Risks Review Technology Discuss.

Slides:



Advertisements
Similar presentations
Panther II Buried Cable Intrusion Detection Sensor
Advertisements

Animal detection Systems Effectiveness Types Design Issues Implementation Applications Costs Operation & Maintenance.
for Storm Survival, Long Term Reliability and Safety
Microwave Protection System
New Non-Contact, Laser-Based Gauge for Measuring Length and Speed of Gypsum Board Stuart Manser Beta LaserMike.
Accessing and Interpreting Web-based Weather Data Clinton Rockey National Weather Service Portland, Oregon.
Guided Wave Radar Pros and Cons
HX-40/40AM 3.0m high mount outdoor detector HX-40: standard model HX-40AM: HX-40 with active IR anti-masking model confidential.
Photoelectric Beam Detector NRTS Series. 2 1. Outline Dual beam detector NRTS series is a part of Red Barrier series. * 30m 60m 90m (Outdoor) range *6.
Photoelectric Beam Detector NRTM Series. 2 1. Outline Dual beam detector NRTM series is a part of Red Barrier series. * 30m 60m 90m (Outdoor) range *Selectable.
SupaRule Cable height meters Presented by: Gary Carroll Director Feb 2004.
7. Radar Meteorology References Battan (1973) Atlas (1989)
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
Fiber-Optic Perimeter Intrusion Detection System.
Physical Transmission Media 8 5/9/ Modified by: Brierley.
Smart Sensor Technology For Rail Network health Hawk Measurement Systems.
Smart Sensor Technology for Gas Pipeline Monitoring
Antenna & Feed Lines Chapter 2 Lesson 2.5. Antenna Basics Two basic types used by hams 1.Ground plane antenna: radiates a signal from the vertical wire.
Project Advisor: Dr. Thomas Schmid
NorCal Tech 2005 Technical Conference
Vibration & Temperature Sensor. Contents ■ Why monitor vibration? ■ Monitor a wide range of machines ■ Vibration measurements ■ Set alarm levels ■ Mounting.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
Dr. Curtis Banks Mentor EV-43 Harvesting Environmental White Noise to Perform Structural Health Monitoring with Fiber Bragg Grating Sensors Justin Colar.
1 INTRUSION ALARM TECHNOLOGY DETECTION DEVICES. 2 INTRUSION ALARM TECHNOLOGY Detection devices can be either passive or active. Passive devices typically.
Motion detector ​ Bikesh Shrestha ​ Ari Rajamäki.
Security Devices A modern security system, with its array of electronic components, is designed to sense, decide, and act. The security system senses events.
Radar Principles and Systems Part I
Performance of the DZero Layer 0 Detector Marvin Johnson For the DZero Silicon Group.
Vibration & Temperature Sensor. Contents ■ Why monitor vibration? ■ Monitor a wide range of machines ■ Vibration measurements ■ Set alarm levels ■ Mounting.
ISAT 303-Lab3-1  Measurement of Condition: Lab #3 (2005):  List of parameters of condition: –Linear distance, angular displacement, vibration, displacement,
Moonlight reflecting off ice crystals in cirrostratus clouds can cause a halo to appear around the moon. Such a halo often indicates that precipitation.
Chapter 4:Transmission Media 1 Basic Idea 2 Transmission media 3 Copper wires 4 Glass fibers 5 Radio 6 Microwave 7 Infrared 8 Laser 9 Choosing a medium.
SMUCSE 8394 BTS – Devices II Sensors Detection, Surveillance, Protection.
Developments in the IntelliFIBER ™ Fiber Optic Fence Sensor
External perimeter protection Active Infra Red Motion sensors
Radar Video Surveillance
Guided Notes on Gathering Weather Data
Satellite and Radar Imagery
Physical Transmission
Introduction to Network (c) Nouf Aljaffan
Weather Factors Chapter Two. Energy in the Atmosphere Most energy from the sun reaches Earth in the form of visible light and infrared radiation, and.
© TAFE MECAT 2008 Chapter 6(b) Where & how we take measurements.
–thermometer –barometer –anemometer –hygrometer Objectives Recognize the importance of accurate weather data. Describe the technology used to collect.
Sensors Por: Flora Gibson.
Precipitation Precipitation refers to any product of the condensation of atmospheric water vapour that is deposited on the Earth's surface. Precipitation.
PENDOGAS SECURITY SYSTEMS LIMITED
Microwave Devices.
What are Waves? Waves are an important part of the Earth, and they’re not just in the water!
GROUND PENETRATING RADAR
Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 3 – Motion Detection.
CRUISE CONTROL DEVICES Presented by Anju.J.S. CRUISE CONTROL DEVICES.
Motion Sensors By Elva S. Agbon ICS 30 B MOTION SENSORS A sensor specifically designed to detect a gentle or sharp up and down or side to side motion.
National Highway Institute 5-1 REV-2, JAN 2006 EQUIPMENT FACTORS AFFECTING INERTIAL PROFILER MEASUREMENTS BLOCK 5.
Wireless Case Study A presentation by Brian Settlage & Andrew List Professor Anup Majumder TM589 Wireless Communication Systems.
Presented BY BEISecurity. Fiber-Optic Perimeter Intrusion Detection System.
Presentation of equipment.
Active Microwave Remote Sensing
Physical Transmission
Precipitation Measuring Instruments
Physical Transmission
Physical Transmission
Physical Transmission
Motion Sensors By Elva S. Agbon ICS 30 B.
Track circuit reliability assessment for preventing railway accidents
HX-40/40AM 3.0m high mount outdoor detector HX-40: standard model
Feature Benefit Feature Benefit Feature Benefit Feature Benefit
Free Space Optics (FSO) Technology Overview
Physical Transmission
Chapter 17, Section 1 and 2: Nature of Electromagnetic Waves
Physical Transmission
Presentation transcript:

Perimeter Security A Holistic Approach

Why Perimeter Security? Review the Basics Consider site specific needs Evaluate Risks Review Technology Discuss Best Value Analysis GOALS Perimeter Security A holistic approach

Financial Efficiency Effective Response Why Perimeter Security? Perimeter Security A holistic approach

FOUR TENETS DETECTION Perimeter Security A holistic approach

FOUR TENETS ASSESSMENT Perimeter Security A holistic approach

FOUR TENETS DELAY Perimeter Security A holistic approach

FOUR TENETS RESPONSE Perimeter Security A holistic approach

FOUR TENETS RESPONSE Perimeter Security A holistic approach

Detection Assessment Delay Response The Holistic Approach FOUR TENETS Perimeter Security A holistic approach

Environmental – Five year weather history – Data Daily Temperature Daily Precipitation Snowfall Wind Ice Fog (anecdotal) SITE ANALYSIS Perimeter Security A holistic approach

SITE DATA December 2007 to December 2008 Perimeter Security A holistic approach

SITE ANALYSIS Environmental Summary (of 5 years days) Precipitation Events – 461 Events above 1” – 1 Average Precipitation Inches Greatest Precipitation – 1.41 Inches Snow Events – 101 Events above 1” – 36 Average Daily Depth – 1.08 Inches Greatest Daily Depth – 4.1 Inches Wind Events Highest Wind Event – 103 MPH 43% of wind events above 20 MPH Ice – 138 days w/precip and temps 32 and below Fog - Anecdotal Perimeter Security A holistic approach

SITE ISSUES –Length of Perimeter –Patrol Road at perimeter –Terrain –Perimeter Barriers –Curved fences –Single Fences in perimeter –Obstacles –Buildings in perimeter –Structures near perimeter –Sources of False Alarms –Recreation near inner perimeter –Wildlife –Condition of fence –Configuration of fence Perimeter Security A holistic approach

Physical - Barriers SITE ISSUES Perimeter Security A holistic approach

Physical - Terrain SITE ISSUES Perimeter Security A holistic approach

Physical - Obstacles SITE ISSUES Perimeter Security A holistic approach

Threats – Aggressive Attempt – Stealthy Attempt – Cut – Tunneling – Bridging – Vaulting/Stilts – Assisted Attempts Cost of Failure – Forms of Failure – Confidence Factor – Addition of manpower – Risk to the public ASSESS RISKS Perimeter Security A holistic approach

Buried Ported Coax (Leaky Cable) TECH Perimeter Security A holistic approach

Buried Ported Coax (Leaky Cable) – Concept Transmit/Receive parallel buried cables establish magnetic field. Disturbance in field is detected. Approx 3’ height field. – Pros Very adaptable to terrain High probability of detection Detects surface and tunneling threats – Cons Running and Standing Water Erosion Moderately susceptible to EMI/RFI – Cost Moderate First Costs Low TCO TECH Perimeter Security A holistic approach

Electrostatic Field (E Field, X Field) TECH Perimeter Security A holistic approach

Electrostatic Field (E Field, X Field) – Concept Electrostatic field established between wires, disturbance of field is detected – Pros Very flexible mounting options No high tensioned cable – Cons Highly susceptible to EMI/RFI Snow builds disables Maintenance (re-tensioning) – Cost Moderate First Costs Moderate TCO TECH Perimeter Security A holistic approach

Bi-Static Microwave Detection TECH Perimeter Security A holistic approach

Bi-Static Microwave Detection – Concept Transmit and receive head establish cigar shaped microwave beam – movement that breaks or partial blocks beam is detected – Pros Visible Deterrence Covert Beam High Probability of detection – Cons Multi-stack to avoid snow builds Must have level, clear field of view Generally after fence barrier – Cost Moderate First Costs Low TCO TECH Perimeter Security A holistic approach

Passive Infrared TECH Perimeter Security A holistic approach

Passive Infrared – Concept Heat sources in the field of view are detected and evaluated as targets – Pros Compares full view with small changes to moderate FAR/NAR from environmental sources – Cons Temperature masking Small targets at the end of field of view – Costs Moderate First Costs Low TCO TECH Perimeter Security A holistic approach

Active Photo Elec, Laser, Infrared TECH Perimeter Security A holistic approach

Active Photo Beam, Laser, Infrared – Concept Break Beam Detectors – Pros Visible Deterrence Covert Beam Variety of mounting options – Cons Snow builds disables Alignment Issues High Maintenance – Cost Moderate First Cost High TCO TECH Perimeter Security A holistic approach

Ground Surveillance Radar TECH Perimeter Security A holistic approach

Ground Surveillance Radar (passive) – Concept Reflected back energy from activity in shaped millimeter wave radar beam is detected – Pros Precise end of field of view cut-off Curtain wall beam pattern available – Cons Freeze over blockage (rare) – Cost Moderate First Costs Low TCO TECH Perimeter Security A holistic approach

Monostatic Microwave and Hybrid (Doppler MW and Passive IR) TECH Perimeter Security A holistic approach

Monostatic Microwave and Hybrid (Doppler MW and Passive IR) – Concept Reflected back energy from IR source or MW energy is detected – Pros Only responds if both detectors are activated (“anded” together) – Cons Very short range – Not Recommended for primary sensor Good product for portals and difficult terrain area TECH Perimeter Security A holistic approach

Acoustic Fence Mounted Sensors (copper) – Fiber Fence Sensors TECH Perimeter Security A holistic approach

Acoustic Fence Mounted Sensors (copper) – Fiber Fence Sensors – Magnetic Polymer Strain Sensors – Concept Vibrations on fence are detected in the sensor as acoustic energy, disturbance of electromagnetic fields or disturbance of light modes – Pros Terrain friendly, large sensitivity adjustment – Cons Subject to NAR/FAR sources on fence – Cost Low to Moderate First Costs Potentially High TCO TECH Perimeter Security A holistic approach

Acoustic and Fiber sensors on/in Razor/Barbed Wire TECH Perimeter Security A holistic approach

Acoustic and Fiber sensors on/in Razor/Barbed Wire – Concept Vibrations on razor/barbed wire are detected in the sensor as acoustic energy, disturbance of electromagnetic fields or disturbance of light modes – Pros Easy install, highly configurable Better shielded from UV – Cons Subject to NAR/FAR sources on fence – Cost Low to Moderate First Costs Moderate TCO TECH Perimeter Security A holistic approach

Fiber Mesh Sensor TECH Perimeter Security A holistic approach

Fiber Mesh Sensor – Concept Fiber mat covers the fence surface, cuts in the mat are detected – Pros Easy install Very low NAR/FAR – Cons Subject to UV damage Very difficult to troubleshoot and repair – Cost Low First Costs High TCO TECH Perimeter Security A holistic approach

Taut Wire Sensor TECH Perimeter Security A holistic approach

Taut Wire Sensor – Concept Array of high tension wires are attached to anchor/sensor posts. Deflection or cut of wire is detected. – Pros Very High Probability of Detection Very Low NAR/FAR Very difficult to defeat – Cons Moderate Maintenance – Cost High First Costs Low TCO TECH Perimeter Security A holistic approach

Video Motion Detection TECH Perimeter Security A holistic approach

Video Motion Detection – Concept Changes in pixels on a video image consistent with desired target is detected and tracked – Pros Combines detection and assessment – Cons High FAR/NAR from environmental issues Heavy rain, fog, snow obscures view and impedes detection – Cost Moderate First Costs Moderate TCO TECH Perimeter Security A holistic approach

Thermal Video Motion Detection TECH Perimeter Security A holistic approach

Thermal Video Motion Detection – Concept Changes in pixels on a thermal video image consistent with desired target is detected and tracked – Pros Combines detection and assessment Targets high contrast images (eliminates most environmental FAR/NAR issues) – Cons Somewhat susceptible to fog – Costs Moderate First Costs Low TCO TECH Perimeter Security A holistic approach

Seismic Detectors TECH Perimeter Security A holistic approach

Seismic Detectors – Concept Seismic disturbances on fence or in the ground activate a “geophone” – signal is interpreted as consistent with target – Pros High Probability of Detection Flexible Deployment – Cons Subject to FAR/NAR from vehicles Reduced sensitivity in frozen ground (buried) – Costs Moderate First Costs Potentially High TCO TECH Perimeter Security A holistic approach

Point Sensors TECH Perimeter Security A holistic approach

Point Sensors – Concept Mechanical action is detected when it activates shock sensor, accelerometer, piezo or mercury switches – Pros Very low initial cost – Cons Potentially high FAR/NAR – Costs Low First Costs Moderate to High TCO (depending on technology) TECH Perimeter Security A holistic approach

Fluid Filled Pressure Sensors TECH Perimeter Security A holistic approach

Fluid Filled Pressure Sensors – Concept Two pressurized fluid filled tubes are buried parallel - micro pressure changes are detected – Pros Buried sensor detects tunneling and surface targets – Cons Reduced sensitivity in frozen ground No deterrence – Cost Moderate First Costs Moderate TCO TECH Perimeter Security A holistic approach

Lethal and Stun Fence TECH Perimeter Security A holistic approach

Lethal and Stun Fences – Concept Lethal or Stun pulses of electrical current are present on horizontal wire array. Contact between wires or to ground is lethal or disabling – Pros Very high deterrence – Cons Lethal requires additional protective fence High nuisance wildlife kills Stun fence potential liability – Cost Moderate to High First Costs (depending on product) Low to High TCO (depending on product) TECH Perimeter Security A holistic approach

Best Value Analysis ANALYSIS Cat WtWeightTaut WireFence SensorBuried SensorArea DetectorsVideo Sensor COST First Costs Cost of Failure (Risk) TCO POD Hi POD increase NAR Failure Potential Factor 8 FAR/NAR Environmental EMI/RFI Discriminates non-threats DETERRANCE Overt Intimidating Factor 8 INTERFERENCE EMI/RFI Weather Terrain (Soils, Water etc) VULNERABILITY Stealthy attack Aggressive attack Assisted attack Avoidance MAINTENANCE Staff perform PM Staff perform CM Cost of Maintenance RELIABILITY (MTBF) Field Components Head End Total00.0 Perimeter Security A holistic approach

The Holistic Approach Perimeter Security is a marriage of technology, the environment and an understanding of the human element SUMMARY Perimeter Security A holistic approach

? QUESTIONS Perimeter Security A holistic approach