Download
slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
Perimeter Security A Holistic Approach PowerPoint Presentation
Download Presentation
Perimeter Security A Holistic Approach

Perimeter Security A Holistic Approach

211 Vues Download Presentation
Télécharger la présentation

Perimeter Security A Holistic Approach

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Perimeter Security A Holistic Approach

  2. Perimeter Security A holistic approach • Why Perimeter Security? • Review the Basics • Consider site specific needs • Evaluate Risks • Review Technology • Discuss Best Value Analysis GOALS

  3. Perimeter Security A holistic approach • Financial • Efficiency • Effective • Response Why Perimeter Security?

  4. Perimeter Security A holistic approach DETECTION FOUR TENETS

  5. Perimeter Security A holistic approach ASSESSMENT FOUR TENETS

  6. Perimeter Security A holistic approach DELAY FOUR TENETS

  7. Perimeter Security A holistic approach RESPONSE FOUR TENETS

  8. Perimeter Security A holistic approach RESPONSE FOUR TENETS

  9. Perimeter Security A holistic approach • Detection • Assessment • Delay • Response The Holistic Approach FOUR TENETS

  10. Perimeter Security A holistic approach • Environmental • Five year weather history • Data • Daily Temperature • Daily Precipitation • Snowfall • Wind • Ice • Fog (anecdotal) SITE ANALYSIS

  11. Perimeter Security A holistic approach SITE DATA December 2007 to December 2008

  12. Perimeter Security A holistic approach • Environmental Summary • (of 5 years - 1825 days) • Precipitation Events – 461 • Events above 1” – 1 • Average Precipitation - .124 Inches • Greatest Precipitation – 1.41 Inches • Snow Events – 101 • Events above 1” – 36 • Average Daily Depth – 1.08 Inches • Greatest Daily Depth – 4.1 Inches • Wind Events • Highest Wind Event – 103 MPH • 43% of wind events above 20 MPH • Ice – 138 days w/precip and temps 32 and below • Fog - Anecdotal SITE ANALYSIS

  13. Perimeter Security A holistic approach • Length of Perimeter • Patrol Road at perimeter • Terrain • Perimeter Barriers • Curved fences • Single Fences in perimeter • Obstacles • Buildings in perimeter • Structures near perimeter • Sources of False Alarms • Recreation near inner perimeter • Wildlife • Condition of fence • Configuration of fence SITE ISSUES

  14. Perimeter Security A holistic approach • Physical - Barriers SITE ISSUES

  15. Perimeter Security A holistic approach • Physical - Terrain SITE ISSUES

  16. Perimeter Security A holistic approach • Physical - Obstacles SITE ISSUES

  17. Perimeter Security A holistic approach • Threats • Aggressive Attempt • Stealthy Attempt • Cut • Tunneling • Bridging • Vaulting/Stilts • Assisted Attempts • Cost of Failure • Forms of Failure • Confidence Factor • Addition of manpower • Risk to the public ASSESS RISKS

  18. Perimeter Security A holistic approach • Buried Ported Coax (Leaky Cable) TECH

  19. Perimeter Security A holistic approach • Buried Ported Coax (Leaky Cable) • Concept • Transmit/Receive parallel buried cables establish magnetic field. Disturbance in field is detected. Approx 3’ height field. • Pros • Very adaptable to terrain • High probability of detection • Detects surface and tunneling threats • Cons • Running and Standing Water • Erosion • Moderately susceptible to EMI/RFI • Cost • Moderate First Costs • Low TCO TECH

  20. Perimeter Security A holistic approach • Electrostatic Field (E Field, X Field) TECH

  21. Perimeter Security A holistic approach • Electrostatic Field (E Field, X Field) • Concept • Electrostatic field established between wires, disturbance of field is detected • Pros • Very flexible mounting options • No high tensioned cable • Cons • Highly susceptible to EMI/RFI • Snow builds disables • Maintenance (re-tensioning) • Cost • Moderate First Costs • Moderate TCO TECH

  22. Perimeter Security A holistic approach • Bi-Static Microwave Detection TECH

  23. Perimeter Security A holistic approach • Bi-Static Microwave Detection • Concept • Transmit and receive head establish cigar shaped microwave beam – movement that breaks or partial blocks beam is detected • Pros • Visible Deterrence • Covert Beam • High Probability of detection • Cons • Multi-stack to avoid snow builds • Must have level, clear field of view • Generally after fence barrier • Cost • Moderate First Costs • Low TCO TECH

  24. Perimeter Security A holistic approach • Passive Infrared TECH

  25. Perimeter Security A holistic approach • Passive Infrared • Concept • Heat sources in the field of view are detected and evaluated as targets • Pros • Compares full view with small changes to moderate FAR/NAR from environmental sources • Cons • Temperature masking • Small targets at the end of field of view • Costs • Moderate First Costs • Low TCO TECH

  26. Perimeter Security A holistic approach • Active Photo Elec, Laser, Infrared TECH

  27. Perimeter Security A holistic approach • Active Photo Beam, Laser, Infrared • Concept • Break Beam Detectors • Pros • Visible Deterrence • Covert Beam • Variety of mounting options • Cons • Snow builds disables • Alignment Issues • High Maintenance • Cost • Moderate First Cost • High TCO TECH

  28. Perimeter Security A holistic approach • Ground Surveillance Radar TECH

  29. Perimeter Security A holistic approach • Ground Surveillance Radar (passive) • Concept • Reflected back energy from activity in shaped millimeter wave radar beam is detected • Pros • Precise end of field of view cut-off • Curtain wall beam pattern available • Cons • Freeze over blockage (rare) • Cost • Moderate First Costs • Low TCO TECH

  30. Perimeter Security A holistic approach • Monostatic Microwave and Hybrid (Doppler MW and Passive IR) TECH

  31. Perimeter Security A holistic approach • Monostatic Microwave and Hybrid (Doppler MW and Passive IR) • Concept • Reflected back energy from IR source or MW energy is detected • Pros • Only responds if both detectors are activated (“anded” together) • Cons • Very short range • Not Recommended for primary sensor • Good product for portals and difficult terrain area TECH

  32. Perimeter Security A holistic approach • Acoustic Fence Mounted Sensors (copper) – Fiber Fence Sensors TECH

  33. Perimeter Security A holistic approach • Acoustic Fence Mounted Sensors (copper) – Fiber Fence Sensors – Magnetic Polymer Strain Sensors • Concept • Vibrations on fence are detected in the sensor as acoustic energy, disturbance of electromagnetic fields or disturbance of light modes • Pros • Terrain friendly, large sensitivity adjustment • Cons • Subject to NAR/FAR sources on fence • Cost • Low to Moderate First Costs • Potentially High TCO TECH

  34. Perimeter Security A holistic approach • Acoustic and Fiber sensors on/in Razor/Barbed Wire TECH

  35. Perimeter Security A holistic approach • Acoustic and Fiber sensors on/in Razor/Barbed Wire • Concept • Vibrations on razor/barbed wire are detected in the sensor as acoustic energy, disturbance of electromagnetic fields or disturbance of light modes • Pros • Easy install, highly configurable • Better shielded from UV • Cons • Subject to NAR/FAR sources on fence • Cost • Low to Moderate First Costs • Moderate TCO TECH

  36. Perimeter Security A holistic approach • Fiber Mesh Sensor TECH

  37. Perimeter Security A holistic approach • Fiber Mesh Sensor • Concept • Fiber mat covers the fence surface, cuts in the mat are detected • Pros • Easy install • Very low NAR/FAR • Cons • Subject to UV damage • Very difficult to troubleshoot and repair • Cost • Low First Costs • High TCO TECH

  38. Perimeter Security A holistic approach • Taut Wire Sensor TECH

  39. Perimeter Security A holistic approach • Taut Wire Sensor • Concept • Array of high tension wires are attached to anchor/sensor posts. Deflection or cut of wire is detected. • Pros • Very High Probability of Detection • Very Low NAR/FAR • Very difficult to defeat • Cons • Moderate Maintenance • Cost • High First Costs • Low TCO TECH

  40. Perimeter Security A holistic approach • Video Motion Detection TECH

  41. Perimeter Security A holistic approach • Video Motion Detection • Concept • Changes in pixels on a video image consistent with desired target is detected and tracked • Pros • Combines detection and assessment • Cons • High FAR/NAR from environmental issues • Heavy rain, fog, snow obscures view and impedes detection • Cost • Moderate First Costs • Moderate TCO TECH

  42. Perimeter Security A holistic approach • Thermal Video Motion Detection TECH

  43. Perimeter Security A holistic approach • Thermal Video Motion Detection • Concept • Changes in pixels on a thermal video image consistent with desired target is detected and tracked • Pros • Combines detection and assessment • Targets high contrast images (eliminates most environmental FAR/NAR issues) • Cons • Somewhat susceptible to fog • Costs • Moderate First Costs • Low TCO TECH

  44. Perimeter Security A holistic approach • Seismic Detectors TECH

  45. Perimeter Security A holistic approach • Seismic Detectors • Concept • Seismic disturbances on fence or in the ground activate a “geophone” – signal is interpreted as consistent with target • Pros • High Probability of Detection • Flexible Deployment • Cons • Subject to FAR/NAR from vehicles • Reduced sensitivity in frozen ground (buried) • Costs • Moderate First Costs • Potentially High TCO TECH

  46. Perimeter Security A holistic approach • Point Sensors TECH

  47. Perimeter Security A holistic approach • Point Sensors • Concept • Mechanical action is detected when it activates shock sensor, accelerometer, piezo or mercury switches • Pros • Very low initial cost • Cons • Potentially high FAR/NAR • Costs • Low First Costs • Moderate to High TCO (depending on technology) TECH

  48. Perimeter Security A holistic approach • Fluid Filled Pressure Sensors TECH

  49. Perimeter Security A holistic approach • Fluid Filled Pressure Sensors • Concept • Two pressurized fluid filled tubes are buried parallel - micro pressure changes are detected • Pros • Buried sensor detects tunneling and surface targets • Cons • Reduced sensitivity in frozen ground • No deterrence • Cost • Moderate First Costs • Moderate TCO TECH

  50. Perimeter Security A holistic approach • Lethal and Stun Fence TECH