Download presentation
Presentation is loading. Please wait.
Published byKelsi Fella Modified over 9 years ago
1
Perimeter Security A Holistic Approach
2
Why Perimeter Security? Review the Basics Consider site specific needs Evaluate Risks Review Technology Discuss Best Value Analysis GOALS Perimeter Security A holistic approach
3
Financial Efficiency Effective Response Why Perimeter Security? Perimeter Security A holistic approach
4
FOUR TENETS DETECTION Perimeter Security A holistic approach
5
FOUR TENETS ASSESSMENT Perimeter Security A holistic approach
6
FOUR TENETS DELAY Perimeter Security A holistic approach
7
FOUR TENETS RESPONSE Perimeter Security A holistic approach
8
FOUR TENETS RESPONSE Perimeter Security A holistic approach
9
Detection Assessment Delay Response The Holistic Approach FOUR TENETS Perimeter Security A holistic approach
10
Environmental – Five year weather history – Data Daily Temperature Daily Precipitation Snowfall Wind Ice Fog (anecdotal) SITE ANALYSIS Perimeter Security A holistic approach
11
SITE DATA December 2007 to December 2008 Perimeter Security A holistic approach
12
SITE ANALYSIS Environmental Summary (of 5 years - 1825 days) Precipitation Events – 461 Events above 1” – 1 Average Precipitation -.124 Inches Greatest Precipitation – 1.41 Inches Snow Events – 101 Events above 1” – 36 Average Daily Depth – 1.08 Inches Greatest Daily Depth – 4.1 Inches Wind Events Highest Wind Event – 103 MPH 43% of wind events above 20 MPH Ice – 138 days w/precip and temps 32 and below Fog - Anecdotal Perimeter Security A holistic approach
13
SITE ISSUES –Length of Perimeter –Patrol Road at perimeter –Terrain –Perimeter Barriers –Curved fences –Single Fences in perimeter –Obstacles –Buildings in perimeter –Structures near perimeter –Sources of False Alarms –Recreation near inner perimeter –Wildlife –Condition of fence –Configuration of fence Perimeter Security A holistic approach
14
Physical - Barriers SITE ISSUES Perimeter Security A holistic approach
15
Physical - Terrain SITE ISSUES Perimeter Security A holistic approach
16
Physical - Obstacles SITE ISSUES Perimeter Security A holistic approach
17
Threats – Aggressive Attempt – Stealthy Attempt – Cut – Tunneling – Bridging – Vaulting/Stilts – Assisted Attempts Cost of Failure – Forms of Failure – Confidence Factor – Addition of manpower – Risk to the public ASSESS RISKS Perimeter Security A holistic approach
18
Buried Ported Coax (Leaky Cable) TECH Perimeter Security A holistic approach
19
Buried Ported Coax (Leaky Cable) – Concept Transmit/Receive parallel buried cables establish magnetic field. Disturbance in field is detected. Approx 3’ height field. – Pros Very adaptable to terrain High probability of detection Detects surface and tunneling threats – Cons Running and Standing Water Erosion Moderately susceptible to EMI/RFI – Cost Moderate First Costs Low TCO TECH Perimeter Security A holistic approach
20
Electrostatic Field (E Field, X Field) TECH Perimeter Security A holistic approach
21
Electrostatic Field (E Field, X Field) – Concept Electrostatic field established between wires, disturbance of field is detected – Pros Very flexible mounting options No high tensioned cable – Cons Highly susceptible to EMI/RFI Snow builds disables Maintenance (re-tensioning) – Cost Moderate First Costs Moderate TCO TECH Perimeter Security A holistic approach
22
Bi-Static Microwave Detection TECH Perimeter Security A holistic approach
23
Bi-Static Microwave Detection – Concept Transmit and receive head establish cigar shaped microwave beam – movement that breaks or partial blocks beam is detected – Pros Visible Deterrence Covert Beam High Probability of detection – Cons Multi-stack to avoid snow builds Must have level, clear field of view Generally after fence barrier – Cost Moderate First Costs Low TCO TECH Perimeter Security A holistic approach
24
Passive Infrared TECH Perimeter Security A holistic approach
25
Passive Infrared – Concept Heat sources in the field of view are detected and evaluated as targets – Pros Compares full view with small changes to moderate FAR/NAR from environmental sources – Cons Temperature masking Small targets at the end of field of view – Costs Moderate First Costs Low TCO TECH Perimeter Security A holistic approach
26
Active Photo Elec, Laser, Infrared TECH Perimeter Security A holistic approach
27
Active Photo Beam, Laser, Infrared – Concept Break Beam Detectors – Pros Visible Deterrence Covert Beam Variety of mounting options – Cons Snow builds disables Alignment Issues High Maintenance – Cost Moderate First Cost High TCO TECH Perimeter Security A holistic approach
28
Ground Surveillance Radar TECH Perimeter Security A holistic approach
29
Ground Surveillance Radar (passive) – Concept Reflected back energy from activity in shaped millimeter wave radar beam is detected – Pros Precise end of field of view cut-off Curtain wall beam pattern available – Cons Freeze over blockage (rare) – Cost Moderate First Costs Low TCO TECH Perimeter Security A holistic approach
30
Monostatic Microwave and Hybrid (Doppler MW and Passive IR) TECH Perimeter Security A holistic approach
31
Monostatic Microwave and Hybrid (Doppler MW and Passive IR) – Concept Reflected back energy from IR source or MW energy is detected – Pros Only responds if both detectors are activated (“anded” together) – Cons Very short range – Not Recommended for primary sensor Good product for portals and difficult terrain area TECH Perimeter Security A holistic approach
32
Acoustic Fence Mounted Sensors (copper) – Fiber Fence Sensors TECH Perimeter Security A holistic approach
33
Acoustic Fence Mounted Sensors (copper) – Fiber Fence Sensors – Magnetic Polymer Strain Sensors – Concept Vibrations on fence are detected in the sensor as acoustic energy, disturbance of electromagnetic fields or disturbance of light modes – Pros Terrain friendly, large sensitivity adjustment – Cons Subject to NAR/FAR sources on fence – Cost Low to Moderate First Costs Potentially High TCO TECH Perimeter Security A holistic approach
34
Acoustic and Fiber sensors on/in Razor/Barbed Wire TECH Perimeter Security A holistic approach
35
Acoustic and Fiber sensors on/in Razor/Barbed Wire – Concept Vibrations on razor/barbed wire are detected in the sensor as acoustic energy, disturbance of electromagnetic fields or disturbance of light modes – Pros Easy install, highly configurable Better shielded from UV – Cons Subject to NAR/FAR sources on fence – Cost Low to Moderate First Costs Moderate TCO TECH Perimeter Security A holistic approach
36
Fiber Mesh Sensor TECH Perimeter Security A holistic approach
37
Fiber Mesh Sensor – Concept Fiber mat covers the fence surface, cuts in the mat are detected – Pros Easy install Very low NAR/FAR – Cons Subject to UV damage Very difficult to troubleshoot and repair – Cost Low First Costs High TCO TECH Perimeter Security A holistic approach
38
Taut Wire Sensor TECH Perimeter Security A holistic approach
39
Taut Wire Sensor – Concept Array of high tension wires are attached to anchor/sensor posts. Deflection or cut of wire is detected. – Pros Very High Probability of Detection Very Low NAR/FAR Very difficult to defeat – Cons Moderate Maintenance – Cost High First Costs Low TCO TECH Perimeter Security A holistic approach
40
Video Motion Detection TECH Perimeter Security A holistic approach
41
Video Motion Detection – Concept Changes in pixels on a video image consistent with desired target is detected and tracked – Pros Combines detection and assessment – Cons High FAR/NAR from environmental issues Heavy rain, fog, snow obscures view and impedes detection – Cost Moderate First Costs Moderate TCO TECH Perimeter Security A holistic approach
42
Thermal Video Motion Detection TECH Perimeter Security A holistic approach
43
Thermal Video Motion Detection – Concept Changes in pixels on a thermal video image consistent with desired target is detected and tracked – Pros Combines detection and assessment Targets high contrast images (eliminates most environmental FAR/NAR issues) – Cons Somewhat susceptible to fog – Costs Moderate First Costs Low TCO TECH Perimeter Security A holistic approach
44
Seismic Detectors TECH Perimeter Security A holistic approach
45
Seismic Detectors – Concept Seismic disturbances on fence or in the ground activate a “geophone” – signal is interpreted as consistent with target – Pros High Probability of Detection Flexible Deployment – Cons Subject to FAR/NAR from vehicles Reduced sensitivity in frozen ground (buried) – Costs Moderate First Costs Potentially High TCO TECH Perimeter Security A holistic approach
46
Point Sensors TECH Perimeter Security A holistic approach
47
Point Sensors – Concept Mechanical action is detected when it activates shock sensor, accelerometer, piezo or mercury switches – Pros Very low initial cost – Cons Potentially high FAR/NAR – Costs Low First Costs Moderate to High TCO (depending on technology) TECH Perimeter Security A holistic approach
48
Fluid Filled Pressure Sensors TECH Perimeter Security A holistic approach
49
Fluid Filled Pressure Sensors – Concept Two pressurized fluid filled tubes are buried parallel - micro pressure changes are detected – Pros Buried sensor detects tunneling and surface targets – Cons Reduced sensitivity in frozen ground No deterrence – Cost Moderate First Costs Moderate TCO TECH Perimeter Security A holistic approach
50
Lethal and Stun Fence TECH Perimeter Security A holistic approach
51
Lethal and Stun Fences – Concept Lethal or Stun pulses of electrical current are present on horizontal wire array. Contact between wires or to ground is lethal or disabling – Pros Very high deterrence – Cons Lethal requires additional protective fence High nuisance wildlife kills Stun fence potential liability – Cost Moderate to High First Costs (depending on product) Low to High TCO (depending on product) TECH Perimeter Security A holistic approach
52
Best Value Analysis ANALYSIS Cat WtWeightTaut WireFence SensorBuried SensorArea DetectorsVideo Sensor COST 000000 First Costs Cost of Failure (Risk) TCO POD 000000 Hi POD increase NAR Failure Potential Factor 8 FAR/NAR 000000 Environmental EMI/RFI Discriminates non-threats DETERRANCE 000000 Overt Intimidating Factor 8 INTERFERENCE 000000 EMI/RFI Weather Terrain (Soils, Water etc) VULNERABILITY 000000 Stealthy attack Aggressive attack Assisted attack Avoidance MAINTENANCE 000000 Staff perform PM Staff perform CM Cost of Maintenance RELIABILITY (MTBF) 000000 Field Components Head End Total00.0 Perimeter Security A holistic approach
53
The Holistic Approach Perimeter Security is a marriage of technology, the environment and an understanding of the human element SUMMARY Perimeter Security A holistic approach
54
? QUESTIONS Perimeter Security A holistic approach
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.