71
Designing Border and Perimeter ESS Systems Thomas Bennett RCDD, DCDC, ESS, OSP, WD, TE, CT BICSI

Designing Border and Perimeter ESS Systems

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Designing Border and Perimeter ESS Systems

Designing Border and Perimeter ESS Systems

Thomas BennettRCDD, DCDC, ESS, OSP, WD, TE, CT

BICSI

Page 2: Designing Border and Perimeter ESS Systems

Discussion Topics for Today’s Presentation:Perimeter Security as a Priority LayerClassifying the Boundary ThreatThe Five Ds of SecurityLayering MethodologiesTopographical LimitationsPhysical BarriersCritical System ProtectionSMAAS and Wireless InfrastructureComponents for Perimeter DesignSecurity Policies for a Rapid ResponseBICSI Challenge

Welcome and Introduction

Page 3: Designing Border and Perimeter ESS Systems

• First Contact with an IntruderAssessing the Threat

The Response Deterrent

• Knowledge of the SitePerimeter Layer May Be LargeInherent Vulnerabilities

Perimeter is a Vital Layer

Page 4: Designing Border and Perimeter ESS Systems

Principles of Security

Page 5: Designing Border and Perimeter ESS Systems

Factors for Deterrence

Page 6: Designing Border and Perimeter ESS Systems

Achieving the Delay

Page 7: Designing Border and Perimeter ESS Systems

Accurate Detection

Page 8: Designing Border and Perimeter ESS Systems

Decision Time

Page 9: Designing Border and Perimeter ESS Systems

• Enforce Predetermined Response Policies

• Response is Calculated for Each Threat Type

• Response Drills• All Perimeter Systems Will be

Tested

Defend the Perimeter

Page 10: Designing Border and Perimeter ESS Systems

Security is Designed in Layers

Page 11: Designing Border and Perimeter ESS Systems

• Man Made Risks– Planned group of Attackers – Individual Intruder

• Natural Risk– Flood, Seismic Event– Storm or Weather Incursion

What Risk Elements Exist ?

Page 12: Designing Border and Perimeter ESS Systems

Perimeter Management – Types of Facilities that Pose Exceptional Design Challenges

Page 13: Designing Border and Perimeter ESS Systems

• Perimeters are Highly Complex• Threats are Difficult to Identify Due to Density

Airport Facilities

Page 14: Designing Border and Perimeter ESS Systems

• Risks and Threats are Easily Concealed• Radiological and Other Sensors Needed

Shipping Ports

Page 15: Designing Border and Perimeter ESS Systems

Homeland Security

Designates Critical

Infrastructure for Federal Funding

To Improve Perimeter Security

Systems

Critical Infrastructure

Page 16: Designing Border and Perimeter ESS Systems

• Chemical Plants

• Grain Storage

• Oil Refineries

• Tank Farms

This image cannot currently be displayed.

This image cannot currently be displayed.

This image cannot currently be displayed.

Special Purpose Commercial Facilities

Page 17: Designing Border and Perimeter ESS Systems

A Combination of Both are Typically Required

Countermeasures: Human vs. Technology

Page 18: Designing Border and Perimeter ESS Systems

• Primary Response• Probes and Reconnaissance• Threat Identification

• Force Assignment• Quantity, Skills Required• Predetermined Mobilization

• Response Plan Execution• Assets in the Air• Assets on the Ground

Response Policies for Perimeter Breach

Page 19: Designing Border and Perimeter ESS Systems

Which Assets are Deemed Critical ?

Page 20: Designing Border and Perimeter ESS Systems

Israel, Russia, Saudi Arabia, Turkey, Mexico, India, China, Pakistan, and the EU all have currently active Border Fence Building Programs. Statistics prove the effectiveness of the fence barrier.

Fence Barriers

Page 21: Designing Border and Perimeter ESS Systems

Layout Methodologies

Page 22: Designing Border and Perimeter ESS Systems

Additional Case Studies

Page 23: Designing Border and Perimeter ESS Systems

Variations on Design

Page 24: Designing Border and Perimeter ESS Systems

Fence Design is Important, However itBut May Not Stop a Determined Intruder

The Goal is to Delay, in order that the Intruder Be Detected…

Page 25: Designing Border and Perimeter ESS Systems

Fence Detection Systems Allow for Intrusion Detection

Page 26: Designing Border and Perimeter ESS Systems

Fence and Gate Vulnerabilities

Page 27: Designing Border and Perimeter ESS Systems

Best Practices for Fence Construction• Foundation and Footer

• Discourages Tunneling• Sufficient Depth

• Minimum Height 12-15’• Security Cap on Top

• Concertina Wire• Barbed Wire

(More than one level)• Fiber or Copper Fence

Detection System Present

Page 28: Designing Border and Perimeter ESS Systems

Portals and Barrier Types for Access

Chemical, Narcotics, Biohazard and Radiological Sensors will be part of the Active Scan Process

Automation is a Trend in Portals

Page 29: Designing Border and Perimeter ESS Systems

Specialized Systems for Critical Facility Access

Traditional Entry System

as Compared to Special Purpose Vehicle

Detainment Barrier

Systems

Page 30: Designing Border and Perimeter ESS Systems

• Communications Duct Bank Footer– Underground Concrete Encasement– Integrated Tamper/Seismic Sensor– Secure Access Ports

• SMAAS – Single Mode as a Strategy• Wireless Backbone

– Bandwidth/Distance Limitations– Mobility Networks– Aerial Support Infrastructure

Designing a Transport System

Page 31: Designing Border and Perimeter ESS Systems

Cloud or Enterprise Infrastructure

Page 32: Designing Border and Perimeter ESS Systems

• Bandwidth Calculation– Based upon Sum of all Systems– Based on Geographical Aggregation– Design based upon Segmentation MethodsFor Each Defined Region

• Network Latency for Video Performance• Central or Remote Stream Monitoring• Mobility Network Mesh vs. Wired

Bandwidth and Performance Requirements

Page 33: Designing Border and Perimeter ESS Systems

• Classified versus Commercial Grade Components

• Use of Ruggedized Technology

• Proven Use in the Environment

• Mission Critical Level of IP Network Availability

Available Technology

Page 34: Designing Border and Perimeter ESS Systems

• Monopole or Tower Requirements

• Other Subsystems

Wireless Support Infrastructure

Page 35: Designing Border and Perimeter ESS Systems

The RF Frequency Spectrum

Page 36: Designing Border and Perimeter ESS Systems

The Three “M”s of Wireless Technology

• Mesh• Microwave• MM Wave

Page 37: Designing Border and Perimeter ESS Systems

• In Band Interference• Out of Band Interference• Broadcast Signals• Unauthorized Devices• Covert Interception

Wireless Intrusion Monitoring

Page 38: Designing Border and Perimeter ESS Systems

The Need for ODAS

Outside DAS will be utilized for communications between

RF mobile devices along a remote perimeter where

normal carrier signals are not present.

Page 39: Designing Border and Perimeter ESS Systems

Wireless Network Vulnerability• Intruder Location Utilizing RF

Receiver Triangulation

• Jamming RF Transmission Location Methods

Page 40: Designing Border and Perimeter ESS Systems

Wireless Spectrum Monitoring

Page 41: Designing Border and Perimeter ESS Systems

• The Intrusion Detection Layer• The Access Control Layer• Video Surveillance• Analytics Processing• IP Based Systems

Electronic Countermeasures

Page 42: Designing Border and Perimeter ESS Systems

• Seismic Detection• Motion Detection

– Infrared– Video Analytics (Motion or Thermal)

• Radar and Wireless Systems, GPR Based

Intrusion Detection Systems

Page 43: Designing Border and Perimeter ESS Systems

Perimeter Wireless Detection System

Detection Based Upon X and K Band Radar Intruder Signature

Page 44: Designing Border and Perimeter ESS Systems

Seismic SensorsMay be Wired or

Wireless

Fence Sensors are Single Mode Fiber or Copper Based

Sensor Technology

Page 45: Designing Border and Perimeter ESS Systems

• Portals and Entrance Points• Intelligent Transportation System

Elements– LPR– Biohazard Detection Systems– Radiological Sensors

• Vehicle RFID Systems

The Access Control Layer

Page 46: Designing Border and Perimeter ESS Systems

Limiting Flow with Entry Portal Systems

• Object Processing Speed is Improved Through Automation

• Various Sensors Types Utilized in this Process

• Video Analytics Including LPR Databases

Page 47: Designing Border and Perimeter ESS Systems

Biometrics and Facial Recognition Systems

Page 48: Designing Border and Perimeter ESS Systems

What Is The Application?• Long Distance Platforms - How Much Height AGL is

Needed?• PTZ versus Fixed Field of View

– Dependent on Distance, Environment, Topography• 180 and 360 Degree Applications• Specialized High Resolution Systems• Aerial Surveillance Platforms• Infrared and Thermal Imaging Systems

Surveillance Platforms

Page 49: Designing Border and Perimeter ESS Systems

Selection of the Camera for the Application

Page 50: Designing Border and Perimeter ESS Systems

The Video Analytics Tool Set• Rules Based Detection• Augments Site Personnel• Remote Notification• Requires Significant Expertise to Deploy• 100% Reliability Not Assured

– Performance Subject to External Factors• Weather Impact• Terrain Issues

Page 51: Designing Border and Perimeter ESS Systems

• Vehicle Detection• Individual Detection• False Alarm/Animal

Discrimination

Types of Analytic Models

Page 52: Designing Border and Perimeter ESS Systems

Surveillance Quality Challenges

Visibility Challenges Due to Terrain, Fog,

Weather, and Lighting

Page 53: Designing Border and Perimeter ESS Systems

Monitoring, Command and Control Systems

• PSIM• VMS Platforms• Monitoring Centers

Page 54: Designing Border and Perimeter ESS Systems

Systems Designed for Mobility

Page 55: Designing Border and Perimeter ESS Systems

ISRAELG-NUS

PLATFORM

Autonomous Vehicles

Autonomous Monitoring and Mobility Platforms areIn Use Today with Proven Success

Page 56: Designing Border and Perimeter ESS Systems

• Satellite Based• High Priority for National Security• Cost is Extreme for 24/7 usage• Earliest Warning System Available

Geospatial Systems

Page 57: Designing Border and Perimeter ESS Systems

Force ResponsivenessA Swift and Powerful Response to Intrusion is Necessary

Page 58: Designing Border and Perimeter ESS Systems

WEAPONIZEDPLATFORMS

• COST STATISTICS

• LOITER TIME

Aerial Platforms

Page 59: Designing Border and Perimeter ESS Systems

Aerostats

SURVEILLANCEPLATFORMS

RADAR PLATFORMS

Page 60: Designing Border and Perimeter ESS Systems

Combat Drones

PREDATORAnd

REAPERPLATFORMS

Page 61: Designing Border and Perimeter ESS Systems

Industrial Drones

TETHERED WIRELESS

Page 62: Designing Border and Perimeter ESS Systems

• Electrical System Source• Power Distribution System• Power System Redundancy• Remote Device Power

– Fence and Gate Systems– Intrusion, ACS, and Surveillance– Communication Infrastructure

Power Systems Design

Page 63: Designing Border and Perimeter ESS Systems

Alternate Power Sources

• Utility Entrances (Fiber and Power)• Transformer Components• Generator Components• Solar and Fuel Cell• Monitoring and Management

– Mobile versus Fixed Control Assets

Page 64: Designing Border and Perimeter ESS Systems

SOLARGAS TURBINEFUEL CELL

Alternate Power Sources

Page 65: Designing Border and Perimeter ESS Systems

• Utility Entrances (Fiber and Power)• Transformer Components• Generator Components• Solar and Fuel Cell• Monitoring and Management

– Mobile versus Fixed Control Assets

Redundant Systems

Page 66: Designing Border and Perimeter ESS Systems

• Transformers and Switchgear• Solar Panels• Fuel Cells

• Fuel Storage • Natural Gas Supply Lines• Generator Farms• Duct Banks

Physical Protection of Key Components

Page 67: Designing Border and Perimeter ESS Systems

• More Advanced Integrations

• Use of 180 and 360 Degree Megapixel Imaging

• Advanced Biometrics

• Local and Remote Site Monitoring

• Sensor Accuracy

Perimeter Security Systems

Page 68: Designing Border and Perimeter ESS Systems

• Cost per Mile Analysis

• Operational Costs

• TCO for ten year analysis– Fixed Capital versus Ongoing Costs

Budgetary Cost Analysis

Page 69: Designing Border and Perimeter ESS Systems

Designer’s Challenge

Page 70: Designing Border and Perimeter ESS Systems

• National 1 Mile Section Border System Design– Security Layers– Perimeter Sensors– Communications Transport– Barriers– Seismic, Radiological, Biohazard Sensors– Surveillance and Access Control

Sample Border Perimeter Design

Page 71: Designing Border and Perimeter ESS Systems

Thank you for attending the presentation!

Enjoy the Conference and Maintain Your Perimeter at all Costs!

[email protected]

Q&A