designing border and perimeter ess systems
TRANSCRIPT
![Page 1: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/1.jpg)
Designing Border and Perimeter ESS Systems
Thomas BennettRCDD, DCDC, ESS, OSP, WD, TE, CT
BICSI
![Page 2: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/2.jpg)
Discussion Topics for Today’s Presentation:Perimeter Security as a Priority LayerClassifying the Boundary ThreatThe Five Ds of SecurityLayering MethodologiesTopographical LimitationsPhysical BarriersCritical System ProtectionSMAAS and Wireless InfrastructureComponents for Perimeter DesignSecurity Policies for a Rapid ResponseBICSI Challenge
Welcome and Introduction
![Page 3: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/3.jpg)
• First Contact with an IntruderAssessing the Threat
The Response Deterrent
• Knowledge of the SitePerimeter Layer May Be LargeInherent Vulnerabilities
Perimeter is a Vital Layer
![Page 4: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/4.jpg)
Principles of Security
![Page 5: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/5.jpg)
Factors for Deterrence
![Page 6: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/6.jpg)
Achieving the Delay
![Page 7: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/7.jpg)
Accurate Detection
![Page 8: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/8.jpg)
Decision Time
![Page 9: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/9.jpg)
• Enforce Predetermined Response Policies
• Response is Calculated for Each Threat Type
• Response Drills• All Perimeter Systems Will be
Tested
Defend the Perimeter
![Page 10: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/10.jpg)
Security is Designed in Layers
![Page 11: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/11.jpg)
• Man Made Risks– Planned group of Attackers – Individual Intruder
• Natural Risk– Flood, Seismic Event– Storm or Weather Incursion
What Risk Elements Exist ?
![Page 12: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/12.jpg)
Perimeter Management – Types of Facilities that Pose Exceptional Design Challenges
![Page 13: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/13.jpg)
• Perimeters are Highly Complex• Threats are Difficult to Identify Due to Density
Airport Facilities
![Page 14: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/14.jpg)
• Risks and Threats are Easily Concealed• Radiological and Other Sensors Needed
Shipping Ports
![Page 15: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/15.jpg)
Homeland Security
Designates Critical
Infrastructure for Federal Funding
To Improve Perimeter Security
Systems
Critical Infrastructure
![Page 16: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/16.jpg)
• Chemical Plants
• Grain Storage
• Oil Refineries
• Tank Farms
This image cannot currently be displayed.
This image cannot currently be displayed.
This image cannot currently be displayed.
Special Purpose Commercial Facilities
![Page 17: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/17.jpg)
A Combination of Both are Typically Required
Countermeasures: Human vs. Technology
![Page 18: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/18.jpg)
• Primary Response• Probes and Reconnaissance• Threat Identification
• Force Assignment• Quantity, Skills Required• Predetermined Mobilization
• Response Plan Execution• Assets in the Air• Assets on the Ground
Response Policies for Perimeter Breach
![Page 19: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/19.jpg)
Which Assets are Deemed Critical ?
![Page 20: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/20.jpg)
Israel, Russia, Saudi Arabia, Turkey, Mexico, India, China, Pakistan, and the EU all have currently active Border Fence Building Programs. Statistics prove the effectiveness of the fence barrier.
Fence Barriers
![Page 21: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/21.jpg)
Layout Methodologies
![Page 22: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/22.jpg)
Additional Case Studies
![Page 23: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/23.jpg)
Variations on Design
![Page 24: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/24.jpg)
Fence Design is Important, However itBut May Not Stop a Determined Intruder
The Goal is to Delay, in order that the Intruder Be Detected…
![Page 25: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/25.jpg)
Fence Detection Systems Allow for Intrusion Detection
![Page 26: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/26.jpg)
Fence and Gate Vulnerabilities
![Page 27: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/27.jpg)
Best Practices for Fence Construction• Foundation and Footer
• Discourages Tunneling• Sufficient Depth
• Minimum Height 12-15’• Security Cap on Top
• Concertina Wire• Barbed Wire
(More than one level)• Fiber or Copper Fence
Detection System Present
![Page 28: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/28.jpg)
Portals and Barrier Types for Access
Chemical, Narcotics, Biohazard and Radiological Sensors will be part of the Active Scan Process
Automation is a Trend in Portals
![Page 29: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/29.jpg)
Specialized Systems for Critical Facility Access
Traditional Entry System
as Compared to Special Purpose Vehicle
Detainment Barrier
Systems
![Page 30: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/30.jpg)
• Communications Duct Bank Footer– Underground Concrete Encasement– Integrated Tamper/Seismic Sensor– Secure Access Ports
• SMAAS – Single Mode as a Strategy• Wireless Backbone
– Bandwidth/Distance Limitations– Mobility Networks– Aerial Support Infrastructure
Designing a Transport System
![Page 31: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/31.jpg)
Cloud or Enterprise Infrastructure
![Page 32: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/32.jpg)
• Bandwidth Calculation– Based upon Sum of all Systems– Based on Geographical Aggregation– Design based upon Segmentation MethodsFor Each Defined Region
• Network Latency for Video Performance• Central or Remote Stream Monitoring• Mobility Network Mesh vs. Wired
Bandwidth and Performance Requirements
![Page 33: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/33.jpg)
• Classified versus Commercial Grade Components
• Use of Ruggedized Technology
• Proven Use in the Environment
• Mission Critical Level of IP Network Availability
Available Technology
![Page 34: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/34.jpg)
• Monopole or Tower Requirements
• Other Subsystems
Wireless Support Infrastructure
![Page 35: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/35.jpg)
The RF Frequency Spectrum
![Page 36: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/36.jpg)
The Three “M”s of Wireless Technology
• Mesh• Microwave• MM Wave
![Page 37: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/37.jpg)
• In Band Interference• Out of Band Interference• Broadcast Signals• Unauthorized Devices• Covert Interception
Wireless Intrusion Monitoring
![Page 38: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/38.jpg)
The Need for ODAS
Outside DAS will be utilized for communications between
RF mobile devices along a remote perimeter where
normal carrier signals are not present.
![Page 39: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/39.jpg)
Wireless Network Vulnerability• Intruder Location Utilizing RF
Receiver Triangulation
• Jamming RF Transmission Location Methods
![Page 40: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/40.jpg)
Wireless Spectrum Monitoring
![Page 41: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/41.jpg)
• The Intrusion Detection Layer• The Access Control Layer• Video Surveillance• Analytics Processing• IP Based Systems
Electronic Countermeasures
![Page 42: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/42.jpg)
• Seismic Detection• Motion Detection
– Infrared– Video Analytics (Motion or Thermal)
• Radar and Wireless Systems, GPR Based
Intrusion Detection Systems
![Page 43: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/43.jpg)
Perimeter Wireless Detection System
Detection Based Upon X and K Band Radar Intruder Signature
![Page 44: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/44.jpg)
Seismic SensorsMay be Wired or
Wireless
Fence Sensors are Single Mode Fiber or Copper Based
Sensor Technology
![Page 45: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/45.jpg)
• Portals and Entrance Points• Intelligent Transportation System
Elements– LPR– Biohazard Detection Systems– Radiological Sensors
• Vehicle RFID Systems
The Access Control Layer
![Page 46: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/46.jpg)
Limiting Flow with Entry Portal Systems
• Object Processing Speed is Improved Through Automation
• Various Sensors Types Utilized in this Process
• Video Analytics Including LPR Databases
![Page 47: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/47.jpg)
Biometrics and Facial Recognition Systems
![Page 48: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/48.jpg)
What Is The Application?• Long Distance Platforms - How Much Height AGL is
Needed?• PTZ versus Fixed Field of View
– Dependent on Distance, Environment, Topography• 180 and 360 Degree Applications• Specialized High Resolution Systems• Aerial Surveillance Platforms• Infrared and Thermal Imaging Systems
Surveillance Platforms
![Page 49: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/49.jpg)
Selection of the Camera for the Application
![Page 50: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/50.jpg)
The Video Analytics Tool Set• Rules Based Detection• Augments Site Personnel• Remote Notification• Requires Significant Expertise to Deploy• 100% Reliability Not Assured
– Performance Subject to External Factors• Weather Impact• Terrain Issues
![Page 51: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/51.jpg)
• Vehicle Detection• Individual Detection• False Alarm/Animal
Discrimination
Types of Analytic Models
![Page 52: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/52.jpg)
Surveillance Quality Challenges
Visibility Challenges Due to Terrain, Fog,
Weather, and Lighting
![Page 53: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/53.jpg)
Monitoring, Command and Control Systems
• PSIM• VMS Platforms• Monitoring Centers
![Page 54: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/54.jpg)
Systems Designed for Mobility
![Page 55: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/55.jpg)
ISRAELG-NUS
PLATFORM
Autonomous Vehicles
Autonomous Monitoring and Mobility Platforms areIn Use Today with Proven Success
![Page 56: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/56.jpg)
• Satellite Based• High Priority for National Security• Cost is Extreme for 24/7 usage• Earliest Warning System Available
Geospatial Systems
![Page 57: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/57.jpg)
Force ResponsivenessA Swift and Powerful Response to Intrusion is Necessary
![Page 58: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/58.jpg)
WEAPONIZEDPLATFORMS
• COST STATISTICS
• LOITER TIME
Aerial Platforms
![Page 59: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/59.jpg)
Aerostats
SURVEILLANCEPLATFORMS
RADAR PLATFORMS
![Page 60: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/60.jpg)
Combat Drones
PREDATORAnd
REAPERPLATFORMS
![Page 61: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/61.jpg)
Industrial Drones
TETHERED WIRELESS
![Page 62: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/62.jpg)
• Electrical System Source• Power Distribution System• Power System Redundancy• Remote Device Power
– Fence and Gate Systems– Intrusion, ACS, and Surveillance– Communication Infrastructure
Power Systems Design
![Page 63: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/63.jpg)
Alternate Power Sources
• Utility Entrances (Fiber and Power)• Transformer Components• Generator Components• Solar and Fuel Cell• Monitoring and Management
– Mobile versus Fixed Control Assets
![Page 64: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/64.jpg)
SOLARGAS TURBINEFUEL CELL
Alternate Power Sources
![Page 65: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/65.jpg)
• Utility Entrances (Fiber and Power)• Transformer Components• Generator Components• Solar and Fuel Cell• Monitoring and Management
– Mobile versus Fixed Control Assets
Redundant Systems
![Page 66: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/66.jpg)
• Transformers and Switchgear• Solar Panels• Fuel Cells
• Fuel Storage • Natural Gas Supply Lines• Generator Farms• Duct Banks
Physical Protection of Key Components
![Page 67: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/67.jpg)
• More Advanced Integrations
• Use of 180 and 360 Degree Megapixel Imaging
• Advanced Biometrics
• Local and Remote Site Monitoring
• Sensor Accuracy
Perimeter Security Systems
![Page 68: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/68.jpg)
• Cost per Mile Analysis
• Operational Costs
• TCO for ten year analysis– Fixed Capital versus Ongoing Costs
Budgetary Cost Analysis
![Page 69: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/69.jpg)
Designer’s Challenge
![Page 70: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/70.jpg)
• National 1 Mile Section Border System Design– Security Layers– Perimeter Sensors– Communications Transport– Barriers– Seismic, Radiological, Biohazard Sensors– Surveillance and Access Control
Sample Border Perimeter Design
![Page 71: Designing Border and Perimeter ESS Systems](https://reader031.vdocuments.mx/reader031/viewer/2022012411/616af52623ca3d299f441cb2/html5/thumbnails/71.jpg)
Thank you for attending the presentation!
Enjoy the Conference and Maintain Your Perimeter at all Costs!
Q&A