1 / 54

Perimeter Security A Holistic Approach

Perimeter Security A Holistic Approach. Perimeter Security A holistic approach. Why Perimeter Security? Review the Basics Consider site specific needs Evaluate Risks Review Technology Discuss Best Value Analysis. GOALS. Perimeter Security A holistic approach. Financial Efficiency

red
Télécharger la présentation

Perimeter Security A Holistic Approach

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Perimeter Security A Holistic Approach

  2. Perimeter Security A holistic approach • Why Perimeter Security? • Review the Basics • Consider site specific needs • Evaluate Risks • Review Technology • Discuss Best Value Analysis GOALS

  3. Perimeter Security A holistic approach • Financial • Efficiency • Effective • Response Why Perimeter Security?

  4. Perimeter Security A holistic approach DETECTION FOUR TENETS

  5. Perimeter Security A holistic approach ASSESSMENT FOUR TENETS

  6. Perimeter Security A holistic approach DELAY FOUR TENETS

  7. Perimeter Security A holistic approach RESPONSE FOUR TENETS

  8. Perimeter Security A holistic approach RESPONSE FOUR TENETS

  9. Perimeter Security A holistic approach • Detection • Assessment • Delay • Response The Holistic Approach FOUR TENETS

  10. Perimeter Security A holistic approach • Environmental • Five year weather history • Data • Daily Temperature • Daily Precipitation • Snowfall • Wind • Ice • Fog (anecdotal) SITE ANALYSIS

  11. Perimeter Security A holistic approach SITE DATA December 2007 to December 2008

  12. Perimeter Security A holistic approach • Environmental Summary • (of 5 years - 1825 days) • Precipitation Events – 461 • Events above 1” – 1 • Average Precipitation - .124 Inches • Greatest Precipitation – 1.41 Inches • Snow Events – 101 • Events above 1” – 36 • Average Daily Depth – 1.08 Inches • Greatest Daily Depth – 4.1 Inches • Wind Events • Highest Wind Event – 103 MPH • 43% of wind events above 20 MPH • Ice – 138 days w/precip and temps 32 and below • Fog - Anecdotal SITE ANALYSIS

  13. Perimeter Security A holistic approach • Length of Perimeter • Patrol Road at perimeter • Terrain • Perimeter Barriers • Curved fences • Single Fences in perimeter • Obstacles • Buildings in perimeter • Structures near perimeter • Sources of False Alarms • Recreation near inner perimeter • Wildlife • Condition of fence • Configuration of fence SITE ISSUES

  14. Perimeter Security A holistic approach • Physical - Barriers SITE ISSUES

  15. Perimeter Security A holistic approach • Physical - Terrain SITE ISSUES

  16. Perimeter Security A holistic approach • Physical - Obstacles SITE ISSUES

  17. Perimeter Security A holistic approach • Threats • Aggressive Attempt • Stealthy Attempt • Cut • Tunneling • Bridging • Vaulting/Stilts • Assisted Attempts • Cost of Failure • Forms of Failure • Confidence Factor • Addition of manpower • Risk to the public ASSESS RISKS

  18. Perimeter Security A holistic approach • Buried Ported Coax (Leaky Cable) TECH

  19. Perimeter Security A holistic approach • Buried Ported Coax (Leaky Cable) • Concept • Transmit/Receive parallel buried cables establish magnetic field. Disturbance in field is detected. Approx 3’ height field. • Pros • Very adaptable to terrain • High probability of detection • Detects surface and tunneling threats • Cons • Running and Standing Water • Erosion • Moderately susceptible to EMI/RFI • Cost • Moderate First Costs • Low TCO TECH

  20. Perimeter Security A holistic approach • Electrostatic Field (E Field, X Field) TECH

  21. Perimeter Security A holistic approach • Electrostatic Field (E Field, X Field) • Concept • Electrostatic field established between wires, disturbance of field is detected • Pros • Very flexible mounting options • No high tensioned cable • Cons • Highly susceptible to EMI/RFI • Snow builds disables • Maintenance (re-tensioning) • Cost • Moderate First Costs • Moderate TCO TECH

  22. Perimeter Security A holistic approach • Bi-Static Microwave Detection TECH

  23. Perimeter Security A holistic approach • Bi-Static Microwave Detection • Concept • Transmit and receive head establish cigar shaped microwave beam – movement that breaks or partial blocks beam is detected • Pros • Visible Deterrence • Covert Beam • High Probability of detection • Cons • Multi-stack to avoid snow builds • Must have level, clear field of view • Generally after fence barrier • Cost • Moderate First Costs • Low TCO TECH

  24. Perimeter Security A holistic approach • Passive Infrared TECH

  25. Perimeter Security A holistic approach • Passive Infrared • Concept • Heat sources in the field of view are detected and evaluated as targets • Pros • Compares full view with small changes to moderate FAR/NAR from environmental sources • Cons • Temperature masking • Small targets at the end of field of view • Costs • Moderate First Costs • Low TCO TECH

  26. Perimeter Security A holistic approach • Active Photo Elec, Laser, Infrared TECH

  27. Perimeter Security A holistic approach • Active Photo Beam, Laser, Infrared • Concept • Break Beam Detectors • Pros • Visible Deterrence • Covert Beam • Variety of mounting options • Cons • Snow builds disables • Alignment Issues • High Maintenance • Cost • Moderate First Cost • High TCO TECH

  28. Perimeter Security A holistic approach • Ground Surveillance Radar TECH

  29. Perimeter Security A holistic approach • Ground Surveillance Radar (passive) • Concept • Reflected back energy from activity in shaped millimeter wave radar beam is detected • Pros • Precise end of field of view cut-off • Curtain wall beam pattern available • Cons • Freeze over blockage (rare) • Cost • Moderate First Costs • Low TCO TECH

  30. Perimeter Security A holistic approach • Monostatic Microwave and Hybrid (Doppler MW and Passive IR) TECH

  31. Perimeter Security A holistic approach • Monostatic Microwave and Hybrid (Doppler MW and Passive IR) • Concept • Reflected back energy from IR source or MW energy is detected • Pros • Only responds if both detectors are activated (“anded” together) • Cons • Very short range • Not Recommended for primary sensor • Good product for portals and difficult terrain area TECH

  32. Perimeter Security A holistic approach • Acoustic Fence Mounted Sensors (copper) – Fiber Fence Sensors TECH

  33. Perimeter Security A holistic approach • Acoustic Fence Mounted Sensors (copper) – Fiber Fence Sensors – Magnetic Polymer Strain Sensors • Concept • Vibrations on fence are detected in the sensor as acoustic energy, disturbance of electromagnetic fields or disturbance of light modes • Pros • Terrain friendly, large sensitivity adjustment • Cons • Subject to NAR/FAR sources on fence • Cost • Low to Moderate First Costs • Potentially High TCO TECH

  34. Perimeter Security A holistic approach • Acoustic and Fiber sensors on/in Razor/Barbed Wire TECH

  35. Perimeter Security A holistic approach • Acoustic and Fiber sensors on/in Razor/Barbed Wire • Concept • Vibrations on razor/barbed wire are detected in the sensor as acoustic energy, disturbance of electromagnetic fields or disturbance of light modes • Pros • Easy install, highly configurable • Better shielded from UV • Cons • Subject to NAR/FAR sources on fence • Cost • Low to Moderate First Costs • Moderate TCO TECH

  36. Perimeter Security A holistic approach • Fiber Mesh Sensor TECH

  37. Perimeter Security A holistic approach • Fiber Mesh Sensor • Concept • Fiber mat covers the fence surface, cuts in the mat are detected • Pros • Easy install • Very low NAR/FAR • Cons • Subject to UV damage • Very difficult to troubleshoot and repair • Cost • Low First Costs • High TCO TECH

  38. Perimeter Security A holistic approach • Taut Wire Sensor TECH

  39. Perimeter Security A holistic approach • Taut Wire Sensor • Concept • Array of high tension wires are attached to anchor/sensor posts. Deflection or cut of wire is detected. • Pros • Very High Probability of Detection • Very Low NAR/FAR • Very difficult to defeat • Cons • Moderate Maintenance • Cost • High First Costs • Low TCO TECH

  40. Perimeter Security A holistic approach • Video Motion Detection TECH

  41. Perimeter Security A holistic approach • Video Motion Detection • Concept • Changes in pixels on a video image consistent with desired target is detected and tracked • Pros • Combines detection and assessment • Cons • High FAR/NAR from environmental issues • Heavy rain, fog, snow obscures view and impedes detection • Cost • Moderate First Costs • Moderate TCO TECH

  42. Perimeter Security A holistic approach • Thermal Video Motion Detection TECH

  43. Perimeter Security A holistic approach • Thermal Video Motion Detection • Concept • Changes in pixels on a thermal video image consistent with desired target is detected and tracked • Pros • Combines detection and assessment • Targets high contrast images (eliminates most environmental FAR/NAR issues) • Cons • Somewhat susceptible to fog • Costs • Moderate First Costs • Low TCO TECH

  44. Perimeter Security A holistic approach • Seismic Detectors TECH

  45. Perimeter Security A holistic approach • Seismic Detectors • Concept • Seismic disturbances on fence or in the ground activate a “geophone” – signal is interpreted as consistent with target • Pros • High Probability of Detection • Flexible Deployment • Cons • Subject to FAR/NAR from vehicles • Reduced sensitivity in frozen ground (buried) • Costs • Moderate First Costs • Potentially High TCO TECH

  46. Perimeter Security A holistic approach • Point Sensors TECH

  47. Perimeter Security A holistic approach • Point Sensors • Concept • Mechanical action is detected when it activates shock sensor, accelerometer, piezo or mercury switches • Pros • Very low initial cost • Cons • Potentially high FAR/NAR • Costs • Low First Costs • Moderate to High TCO (depending on technology) TECH

  48. Perimeter Security A holistic approach • Fluid Filled Pressure Sensors TECH

  49. Perimeter Security A holistic approach • Fluid Filled Pressure Sensors • Concept • Two pressurized fluid filled tubes are buried parallel - micro pressure changes are detected • Pros • Buried sensor detects tunneling and surface targets • Cons • Reduced sensitivity in frozen ground • No deterrence • Cost • Moderate First Costs • Moderate TCO TECH

  50. Perimeter Security A holistic approach • Lethal and Stun Fence TECH

More Related