54
Perimeter Security A Holistic Approach

Perimeter Security A Holistic Approach

  • Upload
    red

  • View
    50

  • Download
    0

Embed Size (px)

DESCRIPTION

Perimeter Security A Holistic Approach. Perimeter Security A holistic approach. Why Perimeter Security? Review the Basics Consider site specific needs Evaluate Risks Review Technology Discuss Best Value Analysis. GOALS. Perimeter Security A holistic approach. Financial Efficiency - PowerPoint PPT Presentation

Citation preview

Page 1: Perimeter Security A Holistic Approach

Perimeter Security

A Holistic Approach

Page 2: Perimeter Security A Holistic Approach

• Why Perimeter Security?• Review the Basics• Consider site specific needs• Evaluate Risks• Review Technology• Discuss Best Value Analysis

GOALS

Perimeter SecurityA holistic approach

Page 3: Perimeter Security A Holistic Approach

• Financial• Efficiency• Effective• Response

Why Perimeter Security?

Perimeter SecurityA holistic approach

Page 4: Perimeter Security A Holistic Approach

FOURTENETS

DETECTION

Perimeter SecurityA holistic approach

Page 5: Perimeter Security A Holistic Approach

FOURTENETS

ASSESSMENT

Perimeter SecurityA holistic approach

Page 6: Perimeter Security A Holistic Approach

FOURTENETS

DELAY

Perimeter SecurityA holistic approach

Page 7: Perimeter Security A Holistic Approach

FOURTENETS

RESPONSE

Perimeter SecurityA holistic approach

Page 8: Perimeter Security A Holistic Approach

FOURTENETS

RESPONSE

Perimeter SecurityA holistic approach

Page 9: Perimeter Security A Holistic Approach

•Detection•Assessment•Delay•Response

The Holistic Approach

FOURTENETS

Perimeter SecurityA holistic approach

Page 10: Perimeter Security A Holistic Approach

• Environmental– Five year weather history– Data

• Daily Temperature • Daily Precipitation• Snowfall• Wind• Ice• Fog (anecdotal)

SITEANALYSIS

Perimeter SecurityA holistic approach

Page 11: Perimeter Security A Holistic Approach

SITEDATA

December 2007 to December 2008

Perimeter SecurityA holistic approach

Page 12: Perimeter Security A Holistic Approach

SITEANALYSIS

Environmental Summary (of 5 years - 1825 days)•Precipitation Events – 461

• Events above 1” – 1• Average Precipitation - .124 Inches• Greatest Precipitation – 1.41 Inches

•Snow Events – 101• Events above 1” – 36• Average Daily Depth – 1.08 Inches• Greatest Daily Depth – 4.1 Inches

•Wind Events• Highest Wind Event – 103 MPH• 43% of wind events above 20 MPH

•Ice – 138 days w/precip and temps 32 and below•Fog - Anecdotal

Perimeter SecurityA holistic approach

Page 13: Perimeter Security A Holistic Approach

SITEISSUES

– Length of Perimeter– Patrol Road at perimeter– Terrain– Perimeter Barriers

– Curved fences– Single Fences in perimeter

– Obstacles– Buildings in perimeter– Structures near perimeter

– Sources of False Alarms– Recreation near inner perimeter– Wildlife– Condition of fence– Configuration of fence

Perimeter SecurityA holistic approach

Page 14: Perimeter Security A Holistic Approach

• Physical - BarriersSITEISSUES

Perimeter SecurityA holistic approach

Page 15: Perimeter Security A Holistic Approach

• Physical - TerrainSITEISSUES

Perimeter SecurityA holistic approach

Page 16: Perimeter Security A Holistic Approach

• Physical - ObstaclesSITEISSUES

Perimeter SecurityA holistic approach

Page 17: Perimeter Security A Holistic Approach

• Threats– Aggressive Attempt– Stealthy Attempt– Cut– Tunneling– Bridging– Vaulting/Stilts– Assisted Attempts

• Cost of Failure– Forms of Failure– Confidence Factor– Addition of manpower– Risk to the public

ASSESSRISKS

Perimeter SecurityA holistic approach

Page 18: Perimeter Security A Holistic Approach

• Buried Ported Coax (Leaky Cable)TECH

Perimeter SecurityA holistic approach

Page 19: Perimeter Security A Holistic Approach

• Buried Ported Coax (Leaky Cable)– Concept

• Transmit/Receive parallel buried cables establish magnetic field. Disturbance in field is detected. Approx 3’ height field.

– Pros• Very adaptable to terrain• High probability of detection• Detects surface and tunneling threats

– Cons• Running and Standing Water• Erosion• Moderately susceptible to EMI/RFI

– Cost• Moderate First Costs• Low TCO

TECH

Perimeter SecurityA holistic approach

Page 20: Perimeter Security A Holistic Approach

• Electrostatic Field (E Field, X Field)TECH

Perimeter SecurityA holistic approach

Page 21: Perimeter Security A Holistic Approach

• Electrostatic Field (E Field, X Field)– Concept

• Electrostatic field established between wires, disturbance of field is detected

– Pros• Very flexible mounting options• No high tensioned cable

– Cons• Highly susceptible to EMI/RFI• Snow builds disables• Maintenance (re-tensioning)

– Cost• Moderate First Costs• Moderate TCO

TECH

Perimeter SecurityA holistic approach

Page 22: Perimeter Security A Holistic Approach

• Bi-Static Microwave DetectionTECH

Perimeter SecurityA holistic approach

Page 23: Perimeter Security A Holistic Approach

• Bi-Static Microwave Detection– Concept

• Transmit and receive head establish cigar shaped microwave beam – movement that breaks or partial blocks beam is detected

– Pros• Visible Deterrence• Covert Beam• High Probability of detection

– Cons• Multi-stack to avoid snow builds • Must have level, clear field of view• Generally after fence barrier

– Cost• Moderate First Costs• Low TCO

TECH

Perimeter SecurityA holistic approach

Page 24: Perimeter Security A Holistic Approach

• Passive InfraredTECH

Perimeter SecurityA holistic approach

Page 25: Perimeter Security A Holistic Approach

• Passive Infrared– Concept

• Heat sources in the field of view are detected and evaluated as targets

– Pros• Compares full view with small changes to

moderate FAR/NAR from environmental sources

– Cons• Temperature masking• Small targets at the end of field of view

– Costs• Moderate First Costs• Low TCO

TECH

Perimeter SecurityA holistic approach

Page 26: Perimeter Security A Holistic Approach

• Active Photo Elec, Laser, InfraredTECH

Perimeter SecurityA holistic approach

Page 27: Perimeter Security A Holistic Approach

• Active Photo Beam, Laser, Infrared– Concept

• Break Beam Detectors– Pros

• Visible Deterrence• Covert Beam• Variety of mounting options

– Cons• Snow builds disables• Alignment Issues • High Maintenance

– Cost• Moderate First Cost• High TCO

TECH

Perimeter SecurityA holistic approach

Page 28: Perimeter Security A Holistic Approach

• Ground Surveillance RadarTECH

Perimeter SecurityA holistic approach

Page 29: Perimeter Security A Holistic Approach

• Ground Surveillance Radar (passive)– Concept

• Reflected back energy from activity in shaped millimeter wave radar beam is detected

– Pros• Precise end of field of view cut-off• Curtain wall beam pattern available

– Cons• Freeze over blockage (rare)

– Cost• Moderate First Costs• Low TCO

TECH

Perimeter SecurityA holistic approach

Page 30: Perimeter Security A Holistic Approach

• Monostatic Microwave and Hybrid (Doppler MW and Passive IR)TECH

Perimeter SecurityA holistic approach

Page 31: Perimeter Security A Holistic Approach

• Monostatic Microwave and Hybrid (Doppler MW and Passive IR)– Concept

• Reflected back energy from IR source or MW energy is detected

– Pros• Only responds if both detectors are

activated (“anded” together)

– Cons• Very short range

– Not Recommended for primary sensor• Good product for portals and difficult

terrain area

TECH

Perimeter SecurityA holistic approach

Page 32: Perimeter Security A Holistic Approach

• Acoustic Fence Mounted Sensors (copper) – Fiber Fence SensorsTECH

Perimeter SecurityA holistic approach

Page 33: Perimeter Security A Holistic Approach

• Acoustic Fence Mounted Sensors (copper) – Fiber Fence Sensors – Magnetic Polymer Strain Sensors– Concept

• Vibrations on fence are detected in the sensor as acoustic energy, disturbance of electromagnetic fields or disturbance of light modes

– Pros• Terrain friendly, large sensitivity

adjustment– Cons

• Subject to NAR/FAR sources on fence– Cost

• Low to Moderate First Costs• Potentially High TCO

TECH

Perimeter SecurityA holistic approach

Page 34: Perimeter Security A Holistic Approach

• Acoustic and Fiber sensors on/in Razor/Barbed WireTECH

Perimeter SecurityA holistic approach

Page 35: Perimeter Security A Holistic Approach

• Acoustic and Fiber sensors on/in Razor/Barbed Wire– Concept

• Vibrations on razor/barbed wire are detected in the sensor as acoustic energy, disturbance of electromagnetic fields or disturbance of light modes

– Pros• Easy install, highly configurable• Better shielded from UV

– Cons• Subject to NAR/FAR sources on fence

– Cost• Low to Moderate First Costs• Moderate TCO

TECH

Perimeter SecurityA holistic approach

Page 36: Perimeter Security A Holistic Approach

• Fiber Mesh SensorTECH

Perimeter SecurityA holistic approach

Page 37: Perimeter Security A Holistic Approach

• Fiber Mesh Sensor– Concept

• Fiber mat covers the fence surface, cuts in the mat are detected

– Pros• Easy install• Very low NAR/FAR

– Cons• Subject to UV damage• Very difficult to troubleshoot and repair

– Cost• Low First Costs• High TCO

TECH

Perimeter SecurityA holistic approach

Page 38: Perimeter Security A Holistic Approach

• Taut Wire SensorTECH

Perimeter SecurityA holistic approach

Page 39: Perimeter Security A Holistic Approach

• Taut Wire Sensor– Concept

• Array of high tension wires are attached to anchor/sensor posts. Deflection or cut of wire is detected.

– Pros• Very High Probability of Detection• Very Low NAR/FAR• Very difficult to defeat

– Cons• Moderate Maintenance

– Cost• High First Costs• Low TCO

TECH

Perimeter SecurityA holistic approach

Page 40: Perimeter Security A Holistic Approach

• Video Motion DetectionTECH

Perimeter SecurityA holistic approach

Page 41: Perimeter Security A Holistic Approach

• Video Motion Detection– Concept

• Changes in pixels on a video image consistent with desired target is detected and tracked

– Pros• Combines detection and assessment

– Cons• High FAR/NAR from environmental issues• Heavy rain, fog, snow obscures view and

impedes detection

– Cost• Moderate First Costs• Moderate TCO

TECH

Perimeter SecurityA holistic approach

Page 42: Perimeter Security A Holistic Approach

• Thermal Video Motion DetectionTECH

Perimeter SecurityA holistic approach

Page 43: Perimeter Security A Holistic Approach

• Thermal Video Motion Detection– Concept

• Changes in pixels on a thermal video image consistent with desired target is detected and tracked

– Pros• Combines detection and assessment• Targets high contrast images (eliminates

most environmental FAR/NAR issues)– Cons

• Somewhat susceptible to fog– Costs

• Moderate First Costs• Low TCO

TECH

Perimeter SecurityA holistic approach

Page 44: Perimeter Security A Holistic Approach

• Seismic DetectorsTECH

Perimeter SecurityA holistic approach

Page 45: Perimeter Security A Holistic Approach

• Seismic Detectors– Concept

• Seismic disturbances on fence or in the ground activate a “geophone” – signal is interpreted as consistent with target

– Pros• High Probability of Detection• Flexible Deployment

– Cons• Subject to FAR/NAR from vehicles• Reduced sensitivity in frozen ground (buried)

– Costs• Moderate First Costs• Potentially High TCO

TECH

Perimeter SecurityA holistic approach

Page 46: Perimeter Security A Holistic Approach

• Point SensorsTECH

Perimeter SecurityA holistic approach

Page 47: Perimeter Security A Holistic Approach

• Point Sensors– Concept

• Mechanical action is detected when it activates shock sensor, accelerometer, piezo or mercury switches

– Pros• Very low initial cost

– Cons• Potentially high FAR/NAR

– Costs• Low First Costs• Moderate to High TCO (depending on

technology)

TECH

Perimeter SecurityA holistic approach

Page 48: Perimeter Security A Holistic Approach

• Fluid Filled Pressure SensorsTECH

Perimeter SecurityA holistic approach

Page 49: Perimeter Security A Holistic Approach

• Fluid Filled Pressure Sensors– Concept

• Two pressurized fluid filled tubes are buried parallel - micro pressure changes are detected

– Pros• Buried sensor detects tunneling and

surface targets

– Cons• Reduced sensitivity in frozen ground• No deterrence

– Cost• Moderate First Costs• Moderate TCO

TECH

Perimeter SecurityA holistic approach

Page 50: Perimeter Security A Holistic Approach

• Lethal and Stun FenceTECH

Perimeter SecurityA holistic approach

Page 51: Perimeter Security A Holistic Approach

• Lethal and Stun Fences– Concept

• Lethal or Stun pulses of electrical current are present on horizontal wire array. Contact between wires or to ground is lethal or disabling

– Pros• Very high deterrence

– Cons• Lethal requires additional protective fence• High nuisance wildlife kills• Stun fence potential liability

– Cost• Moderate to High First Costs (depending on

product)• Low to High TCO (depending on product)

TECH

Perimeter SecurityA holistic approach

Page 52: Perimeter Security A Holistic Approach

• Best Value AnalysisANALYSIS    Cat Wt Weight Taut Wire Fence Sensor Buried Sensor Area Detectors Video SensorCOST     0 0 0 0 0 0  First Costs                Cost of Failure (Risk)                TCO              POD     0 0 0 0 0 0  Hi POD increase NAR                Failure Potential                Factor 8              FAR/NAR     0 0 0 0 0 0  Environmental                EMI/RFI                Discriminates non-threats              DETERRANCE     0 0 0 0 0 0  Overt                Intimidating                Factor 8              INTERFERENCE     0 0 0 0 0 0  EMI/RFI                Weather                Terrain (Soils, Water etc)              VULNERABILITY     0 0 0 0 0 0  Stealthy attack                Aggressive attack                Assisted attack                Avoidance              MAINTENANCE     0 0 0 0 0 0  Staff perform PM                Staff perform CM                Cost of Maintenance              RELIABILITY (MTBF)     0 0 0 0 0 0  Field Components                Head End                               

Total 0 0.0 0.0 0.0 0.0 0.0

Perimeter SecurityA holistic approach

Page 53: Perimeter Security A Holistic Approach

The Holistic Approach

Perimeter Security is a marriage of technology, the environment and an understanding of the human

element

SUMMARY

Perimeter SecurityA holistic approach

Page 54: Perimeter Security A Holistic Approach

?QUESTIONS

Perimeter SecurityA holistic approach