Perimeter Security Presentation
Perimeter Security Presentation
Perimeter Security Presentation
A Holistic Approach
Perimeter Security
A holistic approach
GOALS
• Why Perimeter Security?
• Review the Basics
• Consider site specific needs
• Evaluate Risks
• Review Technology
• Discuss Best Value Analysis
Perimeter Security
A holistic approach
– Windows that are less than 18 feet from the ground are the
most vulnerable since they are easily accessible from the
building exterior
Outer Structure
– Fire Alarms
– Intercoms
– Burglar alarms
– Crystal reporting
Network capabilities for the C•CURE 800 client work stations and
iSTAR controllers can be placed directly an existing networks and
transmitted across SilverNet and multiple WAN’s statewide
– Database Partitioning
– CCTV Integration
– Escort management
– ODBC support
Benefits of the Access System (NAS)
NAS will provide a mainstay for access control support and technical
assistance through out career and life cycles of systems
– Expensive
Storage of video:
– No operator
– UPS 5 KVA or great are they Standby or in use type (Standby UPS’s
usually do not have power conditioners)
– UPS should have remote alarm panels located in server rooms and
security/maintenance office
Part IV Heating, ventilation and
Air Conditioning (HVAC):
Is the facility equipped with the proper HVAC system
– Fire sprinkler system spray heads shall not have any object
within eighteen inches (18”) from the spray head vertically and
two (2) feet horizontally
– Where are the fire extinguishers located and are they depicted
on an emergency evacuation plan
• Pull
• Aim
• Squeeze
• Sweep
Integrator Challenges and IT
Resources:
Challenges that face many security integrators is the lack of
administrative authority on a network (for good reason) and the
lack of understanding of a network or the dynamics of an
organizations network
Key questions to ask an integrator when a system is to be
installed:
DETECTION
FOUR
TENETS
Perimeter Security
A holistic approach
ASSESSMENT
FOUR
TENETS
Perimeter Security
A holistic approach
DELAY
FOUR
TENETS
Perimeter Security
A holistic approach
RESPONSE
FOUR
TENETS
Perimeter Security
A holistic approach
RESPONSE
FOUR
TENETS
Perimeter Security
A holistic approach
FOUR • Detection
TENETS • Assessment
• Delay
• Response
SITE • Environmental
– Five year weather history
ANALYSIS – Data
• Daily Temperature
• Daily Precipitation
• Snowfall
• Wind
• Ice
• Fog (anecdotal)
Perimeter Security
A holistic approach
SITE
DATA
Environmental Summary
SITE •
(of 5 years - 1825 days)
Precipitation Events – 461
• Events above 1” – 1
ANALYSIS • Average Precipitation - .124 Inches
• Greatest Precipitation – 1.41 Inches
• Snow Events – 101
• Events above 1” – 36
• Average Daily Depth – 1.08 Inches
• Greatest Daily Depth – 4.1 Inches
• Wind Events
• Highest Wind Event – 103 MPH
• 43% of wind events above 20 MPH
• Ice – 138 days w/precip and temps 32 and below
• Fog - Anecdotal
Perimeter Security
A holistic approach
– Length of Perimeter
– Patrol Road at perimeter
SITE – Terrain
– Perimeter Barriers
ISSUES – Curved fences
– Single Fences in perimeter
– Obstacles
– Buildings in perimeter
– Structures near perimeter
– Sources of False Alarms
– Recreation near inner perimeter
– Wildlife
– Condition of fence
– Configuration of fence
Perimeter Security
A holistic approach
• Physical - Barriers
SITE
ISSUES
Perimeter Security
A holistic approach
• Physical - Terrain
SITE
ISSUES
Perimeter Security
A holistic approach
• Physical - Obstacles
SITE
ISSUES
Perimeter Security
A holistic approach
• Threats
ASSESS –
–
Aggressive Attempt
Stealthy Attempt
RISKS –
–
Cut
Tunneling
– Bridging
– Vaulting/Stilts
– Assisted Attempts
• Cost of Failure
– Forms of Failure
– Confidence Factor
– Addition of manpower
– Risk to the public
Perimeter Security
A holistic approach
• Passive Infrared
TECH
Perimeter Security
A holistic approach
• Passive Infrared
TECH – Concept
• Heat sources in the field of view are
detected and evaluated as targets
– Pros
• Compares full view with small changes to
moderate FAR/NAR from environmental
sources
– Cons
• Temperature masking
• Small targets at the end of field of view
– Costs
• Moderate First Costs
• Low TCO
Perimeter Security
A holistic approach
• Seismic Detectors
TECH
Perimeter Security
A holistic approach
• Seismic Detectors
TECH – Concept
• Seismic disturbances on fence or in the
ground activate a “geophone” – signal is
interpreted as consistent with target
– Pros
• High Probability of Detection
• Flexible Deployment
– Cons
• Subject to FAR/NAR from vehicles
• Reduced sensitivity in frozen ground (buried)
– Costs
• Moderate First Costs
• Potentially High TCO
Perimeter Security
A holistic approach
• Point Sensors
TECH
Perimeter Security
A holistic approach
• Point Sensors
TECH – Concept
• Mechanical action is detected when it
activates shock sensor, accelerometer,
piezo or mercury switches
– Pros
• Very low initial cost
– Cons
• Potentially high FAR/NAR
– Costs
• Low First Costs
• Moderate to High TCO (depending on
technology)
Perimeter Security
A holistic approach
• Anti-intrusion systems
• Fire Detection systems
• Access Control
• Video-surveillance
• Technological controls
• Intelligent video analysis
Security Solution
FEATURES
• Plant configuration
Manual and self-learning.
• Supervision
Maps, icons, trees, tables, live pictures, MACROS, …
• Warning Report
Events of interest: alarms, failures , …
• History
Events memory, data and camera recorded pictures.
• Control
Areas Activation-deactivation, alarms switching off, sensors exclusion, MACRO activation, … .
Security Solution
CONFIGURABILITY
• Extendibility
New and/or existing hardware full integration.
• Connectivity
LAN, Internet, Wireless, PSTN.
Security Solution
SOFTWARE ARCHITECTURE
• Client • Command Server/DataBase
It represents the plant. It receives data and sends
User Interface: it allows to visualize, configure and to control commands to one or more DataLoggers. It
one or more plants. It has got a player of 36 viewers for live, authenticates and serves the Clients. It executes
pre-post alarm and from storage movies. automatic reactions and scheduled actions
• Player
it is a module (HW + SW) that allows to view a large number of
images on a monitor
• DataLogger
It allows the system to reach the different hardware types.
• Video Store
It is used for the storage of images coming from cameras
• Web Server
It allows the access from mobile phones and smart phones
Smart Surveillance: Features & Benefits
In-House
Guard Annual Annual
$11B
Position Staff Salary Cost
Security
Contract
Guard Guard 5 X $26,628 = $133,140
$11B Security
Director 1 X $64,133 = $64,133
Your
Current
Products & Costs $197,273
Systems
$19B
Card Reader
signal
Cameras
• Samsung Analogic Cameras
(linked to SCS through GPS DVRS4 or Samsung SHR)
• Samsung IP Cameras
• HIK Vision IP cameras
Intrusion Sensors
• GPS Standard unit CEN2100
• GPS Standard unit Defender
Access Control
• GPS Access Control system
Fire Sensors
• AM6000 Notifier
CONTROL ROOM
SFO requirements
• Detect tailgating: more than one person
enters the door with one card swipe.
• Detect piggybacking: one person swipes
the card and another person enters the
door.
• Detect abnormal behaviors:
– Person swiping the card many times.
– Person loitering in front of the door.
Output from SFO
ALARM ALARM
ALARM ALARM
0
1
2
3
4
5
6
7
4/
8
4/4/9
4/10
4/11
4/12
4/13
4/14
4/15
4/16
4/17
Violations
4/18
4/19
4/20
4/21
4/22
4/23
4/24
4/25
4/26
4/29
3
5/0
5/1
Suspicious events
5/2
5/3
5/4
5/5
5/6
5/7
58
5/ /9
5/10
5/11
False Alerts
5/12
5/13
5/14
SmartCatch SFO Airport Results
5/15
5/16
5/17
5/18
SFO Airport Results
5/19
5/20
5/21
5/22
5/23
5/24
No. of Card Swipes
5/25
5/26
5/27
28
0
50
100
150
200
250
300
350
400
450
SmartCatch Algorithms
Background
modeling
Card reader
Palm reader
Object Motion
detection detection
Object Event
tracking detection
SmartCatch Differentiators
Limitations of the current systems
• Difficulties of human tracking: non-rigid motion, changing
image size, occlusion and intersections
• Unable to handle changing shape in relation to camera angle
• Generates very high false alerts
• Cannot handle cluttered environment with multiple objects
SmartCatch Approach
• Neural Network that handles both humans and non-humans in
cluttered envionrments
• Tight Integration of Object detection & tracking resulting in very
high system accuracy
• Robust object classification engine
• Background modeling that automatically adjusts to changing
lighting conditions
• Real-time processing speed
SmartCatch: Benefits
Archive (history)
•Events
GRAPHICAL MAPS
The supervision and Control System manages the GPS Standard alarm control units UC4-96 , CEN2100 and
Defender
• Auto-learning mechanism:
automatic acquisition of the list of
devices linked to the units.
ACCESS CONTROL
Filter by
• Object (sensor, peripheral, ...)
• Operator / Action
• Date/time
• Event type (alarm, failure …)
• To be confirmed / confirmed
• …
MACROS
SCS allows to create very complex Macros: the sequence of actions can be made up with more commands
toward different devices.
Macros activation:
• by the operator
• automatically executed as a
consequence of a particular event
• automatically executed as a
consequence of a particular event on a
particular device
Examples:
• launch of movie recording on one or
more camera on an alarm event on any
sensor
• launch of live visualization from one or
more cameras on an alarm event on a
particular sensor
• activation of the anti-intrusion alarm
on more areas with a single click made
by the operator
• activation of the anti-intrusion alarm
on more areas on the badge passage
INTELLIGENT IMAGES ANALYSIS
• Motion detection
• Unattended objects
• Removed objects
• Perimeter crossing
Coming soon:
• License plates recognition
• Tracking
• Panic detection
INSTALLATIONS
• Private museum
• Explosive bunker
• Stadium
• Chemical industry
• Harbor
• Urban surveillance
• Hospital
• Power station
• Airport
UNIQUE SELLING PROPOSITION
SUMMARY
The Holistic Approach
QUESTIONS