security notes 1

Upload: fraserscott

Post on 30-May-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 Security Notes 1

    1/29

    Security with a "sting in the tail!" Traditional barrier with retractable spikes in the ground. Fast andeffective protection.

    To really stop thieves in their tracks, retractable spike barriers offer an excellent solution. By

    combining these automated systems with your entry and exit point security system, you can be sure thatno unauthorised vehicles can gain access to your property. The spike barriers retract back into a gullyto prevent them from affecting authorised access but can be deployed if needed in an emergency or as aprimary line of defence at vulnerable entry points.

    If combined with a single barrier, the spikes can be also used as a visual deterrent. In the closed position,the barrier arm is in the horizontal position which blocks traffic flow, and the immobilising "spikes" areexposed. This gives anyone checking the vulnerability of the entry point a visual signal that the propertyis protected by sophisticated systems. In the open position, the barrier arm is in the vertical positionallowing traffic flow, and the immobilising spikes are recessed into a road mounted tray assembly buriedbelow the road surface. Installation ofspike barriers can be carried out by our highly trained engineers,giving you peace of mind and improved security. Contact JAYMAC Security in confidence for furtherdetails or browse our website for more information.

    cccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc

    Rising Road Blockers - From 5800.00 Exc VAT

    http://www.jaymacsecurityproducts.com/uploaded_img/large/P049_Spike%20Barriers%20Category%20Image.jpg
  • 8/14/2019 Security Notes 1

    2/29

    The ultimate in entry and exit point physical security, rising road blockers present an immovablebarrier to anyone wishing to gain unauthorised access to your property. A solid metal barrier rises upfrom the road surface making it impossible for any vehicle to gain entry to your location. Able to

    withstand impact and far more secure than a conventional automated barrier, rising road blockers arethe barrier of choice for many high security installations and for multiple access entry point locations.

    Rising blockers locate into an assembly mounted below the road surface and can be activated using arange of devices including card swipe entry systems or personally maintained guard stations at theentrance. The rising road blocker is so effective in stopping unwanted or unauthorised access that it hasbecome the security measure of choice for banks and other high-risk locations. Even large vehicles orvehicles with high wheelbases cannot overcome a high security rising blocker. Full installation isavailable through JAYMAC Security by one of our highly trained engineers. Contact JAYMAC Security inconfidence to discuss your requirements or browse our website for further details.

    cccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc

    Anti Scale Barriers

  • 8/14/2019 Security Notes 1

    3/29

    For added security, anti scale barriers can be added to McArthur fencing.

    Super Spike consists of seven sets per metre of rotating spikes, each set having 20 spiked steel points. This

    type of security barrier also acts as a visual deterrent which would prove effective if put to the test by would-

    be intruders. A choice of fixing brackets allow the barriers to be added to brick walls and the eaves of

    buildings. Spikes are delivered to site in flat form for shaping during the assembly process.

    Ccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc

    Bomb Proof wallpaper

    The X-Flex wallpaper is really a layer of Kevlar-type material, in between sheets of "elastic polymerwrap," which provides both flex and strength so that the projectile doesn't knock the wall down. It seemsreally effectivecheck out Pop Sci's video here for evidenceand the US Army is considering using it forbases in Iraq and Afghanistan. It's also incredibly easy to attach, being basically a rollable sheet,although I'm not sure if it can be unattached and reused. Still, its effectiveness is really impressive

    Ccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc

    http://www.popsci.com/bown/2009/video/video-bombproof-wallpaper-vs-wrecking-ballhttp://www.popsci.com/bown/2009/video/video-bombproof-wallpaper-vs-wrecking-ball
  • 8/14/2019 Security Notes 1

    4/29

    The X-Flex wallpaper is an adhesive with sticky backing that attaches to the inside of brickand cinder walls. According to its designers, covering an entire room takes less than an hour.The wallpaper is so effective that a single layer can keep a wrecking ball from smashingthrough a brick wall, and a double layer can stop blunt objects (i.e. a flying 24) fromknocking downdrywall.

    So how does it work? The X-Flex system features Kevlar-like material in between two sheetsof elastic polymer wrap. Apparently, thats all it takes to keep a wrecking ball from takingdown your house.

    The Army is already thinking about using the wallpaper on bases in Iraq and Afghanistan,

    and Berry Plastics plans to sell a commercial version of X-Flex next year.

    Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    As used in various applications for example by Utility Companies to protect buildingsand sub-stations, pump houses, water treatment and power plants. TechnicalInformation:

    Modular blast protection, standard panel size 2400mm x 500mm x 83mm

    Testing by HOSDB for 2.5kg Pe4 in contact Designed for external & internal applications Cost effective blast protection system Damage limitation to protected sites Rapid build and installation Weight 31 kilos per panel (26 kilos per sq. M)

    Ccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc

    Panic rooms

    http://www.inhabitat.com/2008/11/24/ecorock-drywall-by-serious-materials/http://www.inhabitat.com/2008/11/24/ecorock-drywall-by-serious-materials/http://www.inhabitat.com/2008/11/24/ecorock-drywall-by-serious-materials/
  • 8/14/2019 Security Notes 1

    5/29

    Introduction

    Panic rooms are more commonly known as safe or sanctuary rooms and the concept has arisenin response to the increased risk of kidnapping, criminal and terrorist attacks on high profile orwealthy individuals and their families. Typically the intent of a safe room is to provide short termprotection for the occupants until help arrives or the attackers leave the scene.

    They can range from simple rooms with reinforced doors to elaborate fortresses that protect theiroccupants against biological and nuclear attack, hurricanes and home invasions.

    Construction

    A panic room at its most basic level is a box with an opening. So all six sides of the box walls,ceiling and floor must be fortified. To protect against simple physical attack an existing room canbe used and reinforced with marine ply and expamet sheets. In order to provide both physicaland ballistic protection we use a modular prefabricated walling panel known as Metrowall. Allgrades of Metrowall panels and doors have been tested and certified to EN 11431, EN1522-1.

    The European standard EN 1143-1 covers attacks from a variety of cutting tools, includinghammers, chisels, crowbars, high-powered disk cutters, oxy-acetylene and the arc-air cuttingtorch depending on the security grade. Testing is based on a points system, which is included inthe EN standard documentation.

    Ballistic protection is provided upto BR6 level

    ClassType ofweapon

    CalibreBulletType

    BulletMass

    TestRange

    BulletVelocity

    Comparison

    FB5(s) Rifle 5.56x45*FJ2)/PB/

    SCP1

    4,00,1

    100,5

    95010

    Equiv. R1

    FB6(s) Rifle 5.56x45*FJ2)/PB/

    SCP1

    4,0

    0,1

    10

    0,5

    950

    10

    FB6(s)Rifle (see

    note)7.62x51*

    FJ1)/PB/SC

    9,50,1

    100,5

    95010

    Equiv. R2

    The entrance door is the one weak point of the fortified box. The PDP door is constructed fromthe same materials as the wall structure and secured by four point locking giving significantprotection against forced entry. The door features keyless entry which can be linked to a numberof access control systems included biometric devices.

    Panic Room Features

    CommunicationThis is achieved through a buried phone line which allows communication to the outside world as

    well as a direct alarm link to police or security teams.

  • 8/14/2019 Security Notes 1

    6/29

  • 8/14/2019 Security Notes 1

    7/29

    Door are designed are for personnel protection, explosives storage, munitions manufacture and

    development, terrorist bomb, accidental explosions and explosive containment

    The Blast door construction varies depending on the design requirements and the doors application

    and a full set of bespoke independent design calculations are supplied with every door type

    Cccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc

    Blast Proof Windows

    Have you ever wished that you could have windows that blocked out all they should from theoutside? Well now you can have them with blast resistant windows. While these windows havebeen designed to withstand a great amount of pressure, they also work as great barriers forsound. These windows are used worldwide in refineries, banks, and the aerospace industry.

    Blast proof windows are designed to withstand pressure up to 12 PSI. The glass itself is calculatedand certified glass polycarbonate. It has been tested to ensure that it is up to standard and themanufacturers ensure that the windows do meet the requirements for hazardous material

    storage. Depending on the company that you use to build your windows, you may be given alifetime guarantee.

    One such industry is the United States Bullet Proof Inc. This company prides itself on creatingsome of the countrys best blast resistant windows. Pride and careful attention to detail is usedwhen each custom window is built. The many licensed engineers working with company will besure to help you to create the perfect window for your needs.

    The Drawn Metal Limited has been creating blast resistant windows since 1924 in the UnitedKingdom. The increased demand for security has increased the demand for blast proof or blastresistant windows. Drawn Metal prides itself on creating a product that can stand up to justabout anything and this is why their windows are being used in Royal residences. In addition to

    creating a great product, the company assures that its windows will stand the test of time.Professional installers will come to your location and install the windows to ensure they are inplace correctly.

    http://www.gaffco.com/gaffco_windows_gwa.htm
  • 8/14/2019 Security Notes 1

    8/29

    Vision WindowGVWTHE GVW Vision Exchange Window can be made with or without natural voice transmission. Thiswindow is identical to the Exchange window above execept the shelf is omitted and replace withaluminum frame along bottom edge.

    The GVA service window with the aluminum clamp-on frame is identical to the GWA window aboveexcept for a frame along the bottom in place of the stainless steel shelf and deal tray.

    Cccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc

    Security lighting

    Securimax is committed to growing and developing their exterior/ security lighting range. Together with IQ-Group, suppliers of the high quality IQ-group brand, Securimax has been able to continue to introduce to themarket high quality products while providing a service level thats second to none. IQ-group are a leading global

    http://www.gaffco.com/gaffco_windows_gvw.htmhttp://www.gaffco.com/gaffco_windows_gvw.htm
  • 8/14/2019 Security Notes 1

    9/29

    supplier, and have an enviable reputation for design, innovation, quality and value. Building on this, Securimax iscontinualy gaining valuable information from the market to ensure that all products supplied meet the demandingrequirements of NZ conditions.

    Whether there is a requirement for a twin spot sensor, with the additional feature of scanning LEDs to deterpotential prowlers; or a standalone sensor to switch existing lighting; Securimax have a product to meet everyexterior lighting requirement.

    The Trinity lighting range, is a premium product designed for ease of installation and visual diagnostics for thecontractor. In sensor control mode the LEDs scan back and forth awaiting movement within its 200 degreedetection range. This product range includes, twin-spots with sensor, floodlights with sensor, standalone sensorsand decorative globe lights with sensor. A recent addition to this family is the Slave spot which can be used inconjunction with our other Trinity products to provide a halogen lighting solution.

    With exterior lighting becoming more of a design feature of consumers homes, the Trinity range now includesNEW Satin Silver models to complement the aesthetics of todays modern homes. The Satin Silver finish is nowavailable in; Trinity Standalone Floods, Trinity Floods with Sensor, Trinity Twin Spots with Sensor and theStandalone Trinity Sensor.

    The technical features of the sensor circuitry in the "Trinity Professional Series" range includes such benefits as:

    Power-On Test Mode

    Holiday Mode - The sensor can be set to offer a lights-on period in the evening when dusk settles

    Manual Control Mode - To latch lights on permanently (e.g: for patio barbecue area) a double off/onaction is required at the light switch.

    Sensor Control Mode - When the sensor is powered on in the Sensor Control mode a series of 3 red

    LEDs on the front of the sensor scan back and forth to indicate operation and deter possible prowlers.

    At the other end of the market Securimax supply a range of price competitive products to meet the every dayrequirements of the contractor. The Smart Sense standalone sensor is one of these items that has been updatedin response to market feedback. A larger terminal box has been added for ease of wiring and the maximumswitching capacity is now 2000W.

    Also available is the ECO Branded Product:The Eco Spot is also built to the same high quality standards:

    Designed to be fitted with traditional PAR38 type incandescent lamps.

    120 degree detection pattern, 12 metre range (Up to 20 metres as detailed above).

    Pulse Manual Override feature.

    Power On Test Mode

    All stainless steel screw fasteners. (No unsightly rust stains)

    Available in black & white

    Nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn

    Home Security Panels (Wired / Wireless) / Autodialer

    Home Security Panels are installed within the offices and homes to prevent the belongings from

  • 8/14/2019 Security Notes 1

    10/29

    burglary and theft. Prepared using the digital technology, they instantly warn about the danger.

    Features of Control Panel

    Multi Zone Programmable for instant, Delay 1 or 2, 24 Hour Silent Alarm Reporting

    Programmable Master code, Client Code & User Codes

    All user codes are with Duress Function

    Programmable Time for Exit Delay, 1 & 2 and Alarm Duration

    Home & Away Operations

    Forced to Arm & Arm Prohibited Option

    Non-Volatile Memory

    Full Memory for Alarm Event Zone(s)

    Exit and Entry Beep Enable Disable Options

    Instant Arming Codes for home or Away Operation

    Built in Dynamic Battery Charger & Tester

    On Board Activation of Panic & Duress

    Tamper Proof

    AUTODIALER

    Auto dialer is used to automate the dialing procedure. The number to be dialed is feed ed in the

    system by the authorized person.

    Three types of help facilities are provided:

    Burglar alarm

    Medical help

    Fire alarm help

    This system has the facility to automatically dial the respective number with there corresponding

    switch placed in the required location. System detects the respective key pressed and

    automatically dials the number.

    Features of Communicator & Dialer

    Two 32 digit telephone numbers for communicator

    Four 32 digit telephone numbers for Auto Dialer

    Remote Arm Disarm the Alarm

    Periodic Report- Station or Authorized Party Call For Status

    20 seconds non- volatile user Re- Programmable Voice Message

    Controllable and Prolong-able Listen in Duration

    Programmable of Dialing Attempts, 8 Repeats Maximum Periodic Report Interval Time Options

    Use the existing Telephone Line, No Additional is required

    Vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv

    Audio / Video Door Phone

  • 8/14/2019 Security Notes 1

    11/29

    Audio Door Phones

    Audio Door Phones are surface mounted and manufactured from high impact ABS plastic, with

    "polished mirror" finish. They include a lock release button, which works without picking the

    handset up, several securing points, electret microphone and coiled cable BT type plugs in handset

    and telephone for the easy connection. Their features include:

    Double ding-dong

    One doorway access system connects up to 5 indoor extension

    Remote unlocking

    Power supply: 20 W, 15 DC

    System components: host, extension and power supplier

    Video Door Phones

    Video Door Phones are used for security and protection in homes and offices. They assist in

    identifying the visitors outside the door thus preventing the entry of any unknown person. Their

    features are:

    Talk back, inner calling, conversation and unlock

    High performance CCD camera with infrared illumination

    Noctilucent keyboard

    30 seconds ring, 120 seconds confidential conversation and 30 seconds active surveillance

    Storage of picture along-with date and time

    System components: host, extension and power supplier

    Cccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc

    Security Sensor- Magnetic /Dualbeam Sensor / PanicSwitch/Hooter/Motion Detector / Wireless Panel

  • 8/14/2019 Security Notes 1

    12/29

    Panic Switch- It raises alarm on detecting the vibrations and is helpful in protecting against

    intrusions through glass doors or windows. Smoke Sensor- Electric detectors use state of the art optical sensing chambers. The ability to

    plug these detectors into a variety of base option extends panel compatibility and application

    flexibility.

    PIR Sensor- Powerful accessory for your Alarm kit. It detects up to 10 meters above the floor of

    any warmth objects moving or passing in front.

    Acoustic Glass Break Detector- The GBS- 210 glass break detector detects the breaking of

    glass windows. Used processing guarantees high sensitivity to the breaking of all types of glass

    Smoke Detector: Siren is sounded in case of smoke detecting from fire

    Hooter: They alert the neighbors and passers by raising an alarm which is good enough to alert

    the entire neighborhood. It also chases way the intruders

    Motion Detector: These are micro controller based infrared sensors that detect intruders if any

    one pass through the covered area by the PIR

    Vibration Sensor: This sensor raises alarm on detecting the vibrations and is helpful in

    protecting against intrusions through glass doors or windows.

    Magnetic Contact Switch: Magnetic contacts protect the doors against the intrusions. They are

    available in three different colors to match the color of the doors.

    Electronic Locks- Electromagnetic Locks are useful for controlling access of high traffic doors

    where fail safe operation, (door to be unlocked when there is power failure) is required.

    Single / Twin / Quad Beam Sensors- Single / Twin Beam Sensors are recommended for

    Security for periphery & boundary wall protection

    Vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv

  • 8/14/2019 Security Notes 1

    13/29

    Sensor Systems

  • 8/14/2019 Security Notes 1

    14/29

    The Guard Tower and Induced Pulse perimeter security systems can be combined with other sensor systems to provide extrasecurity in sensitive areas or at gate openings.

    Each Guard Tower cap has two optional auxiliary contact points which can be connected to other intrusion detection sensorssuch as photo beams, microwave, or fiber optic sensors. The Guard Tower can identify an alarm via a dry contact closure fromthe auxiliary sensor and transmit that alarm to the headend system.

    Photo Beam Sensor - Affordable Security ProtectionPhoto beam sensors provide redundant detection capabilities when combined with Zareba's perimeter barrier system. The quadphotoelectric beams meet the highest intrusion detection standards of quality and reliability. An alarm is activated if two beamsbreak simultaneously.

    Photo Beam Sensor Features

    High reliability with synchronized twin beams

    Low false alarm rate caused by weather, leaves or birds

    Affordable solution for perimeter installations including fences,roofs or wall tops

    Outdoor protection distance 330 ft. (100m)

    Response time of 50 - 700 msec.

    Alarm and attenuation LEDs

    Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    Sensors for perimeters and internal

    Takex Pulnix PB-IN200HF Intelligent Quad Photoelectric, 660'/1320' Intell.Quad 4-Channel PEBeam Sensor, NO/NC, 10-30VDC, Double Pulse Modulation, 940nm Wavelength, 2000m

  • 8/14/2019 Security Notes 1

    15/29

    (6600ft.) Signal Arrival Distance (PBIN200HF PB IN200HF PB-IN200H PB-IN200 PBI-N200HFPBIN-200HF) $490.00

    Takex Pulnix PB-IN200HF Intelligent Quad Photoelectric, 660'/1320' Intell.Quad 4-Channel PEBeam Sensor, NO/NC, 10-30VDC, Double Pulse Modulation, 940nm Wavelength, 2000m(6600ft.) Signal Arrival Distance, Response Time 50-700 msec. Adjustable, Lens AdjustmentVertical:10/Horizontal:90, Sensitivity Attenuation Led Red On when beam reception isattenuated

    General Information

    Manufacturer Takex Pulnix

    Manufacturer PartNumber

    PB-IN200HF

    Product Name Intelligent Quad Photoelectric, 660'/1320' Intell.Quad 4-Channel PEBeam Sensor, NO/NC, 10-30VDC

    Specifications

    Detection System Quad, Active Infrared Beam

    Wavelength 940nm

    Modulation Double Pulse Modulation

    Protection DistanceOutdoors

    200m (660ft.)

    Protection DistanceIndoors

    400m (1320ft.)

    Signal Arrival Distance 2000m (6600ft.)

    Response Time 50-700msec.Adjustable

    Frequency Selection 4 Channels

    Alarm OutputDry Relay ContactN/O, N/C Switch SelectableReset: Approx. 1.5 secs.

    Contact Rating 30VAC/DC 1.0A Max

    Environmental OutputDry Relay ContactN/O, N/C Switch Selectable

    Contact Rating1 30VAC/DC 1.0A Max

    Tamper Output

    Micro-switch Dry Contact

    Form B, N/C

    Contact Rating2 30VDC 0.1A

    Alarm Led Red On at Alarm

    Sensitivity AttenuationLed Red

    On when beam reception is attenuated

    Alarm Memory Led RedPulsing at AlarmManual Reset: By Auxilliary SwitchAuto Reset:55 to 60mins.

    Lens AdjustmentVertical: 10Horizontal: 90

    Supply Power 10 to 30VDC ( non polarity)

    Current Consumption 85mA typical (120mA Max.at alignment)

    Ambient Temperature -31F to + 151F (-35C to + 66C)

  • 8/14/2019 Security Notes 1

    16/29

    Installation Wall or Post mounting

    Wiring Terminals

    WeightTransmitter: 1200g (42oz)Receiver:1300g (45.5oz)

    External Appearance Body: PC Resin (wine red)

    Bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb

    Comparison and Contrast of Exterior Perimeter Security Systems

    By John Trinckes

    IntroductionIt is hard to decide on the right security system since there are so many different types of exteriorperimeter security systems available on the market. This paper is designed to answer the followingquestions: What are the most common perimeter systems? What are the principles behind thesesystems? How do these systems work in different applications? What are the considerations whendeciding to use a certain system? And how can these systems be defeated?

    When classifying and comparing certain perimeter systems, there are five methods to consider. First toconsider are passive or active sensors. Passive sensors detect energy submitted by the target, or detect

    a change in the environment associated with the presence of the target. While Active sensors transmitsome form of energy and detect a change in the received energy created by a disturbance caused by a

    target. A second type of comparison is whether or not the sensor is hidden (covert) or is it visible to theintruder. A third type of method of comparison is the requirement for the sensors to have a line-of-sight

    (LOS) or does the sensor follow the terrain. A line-of-sight system usually refers to a clear line-of-sightbetween the transmitter and receiver of an active sensor. A terrain-following sensor does exactly what it

    states by allowing the transducer elements and the radiated field to follow the terrain. The fourth type ofcomparison is whether the sensors are volumetric (detect intrusions in a volume of space) or line

    detection (detect along a line). And finally, the application method that classifies these systems into threemodes: buried line, fence-associated, and freestanding (Garcia, 2001).

    Table 1. Types of Exterior Sensors and Characteristics. (Garcia, p. 67)

    Modes Type of Sensors Passive or

    Active

    Covert or

    Visible

    LOS or Terrain Volumetric or

    Line Detection

    Buried Line SeismicPressure

    Passive Covert Terrain Line Detection

    Magnetic Field Passive Covert Terrain Volumetric

    Ported CoaxialCable

    Active Covert Terrain Volumetric

    Fiber-OpticCable

    Passive Covert Terrain Line Detection

    Fence-Associated

    Fence-Disturbance

    Passive Visible Terrain Line Detection

    Sensor Fence Passive Visible Terrain Line DetectionElectric Field Active Visible Terrain Volumetric

    Freestanding Video MotionDetection

    Passive Covert LOS Volumetric

    BistaticMicrowave

    Active Visible LOS Volumetric

    Passive Infrared Passive Visible LOS VolumetricActive Infrared Active Visible LOS Line Detection

    Dual TechnologyActive/Passive Visible LOS Volumetric(Garcia, 2001)

    Buried Line Sensors

    There are four types of buried-line systems: pressure or seismic, magnetic field, ported coaxial cable,and fiber-optic. A pressure or seismic sensor responds to disturbances of the soil caused by an intruder

    walking, running, jumping, or crawling on the ground. Pressure sensors are sensitive to lower frequencypressure waves than seismic sensors. Pressure sensors consist of a hose filled with liquid and connected

    to a transducer (see Diagram 1). Some defeating activities are avoiding the detection zones, cushioningmovement vibrations, bridging over the zones, and any combination of these.

    A seismic sensor consists of geophones that are made up of conducting coil and magnet (see Diagram 2).Either the coil or magnet are fixed and let the other vibrate during a disturbance. These types of sensorsare very dependent on the type of soil in which they are buried. The depth at which they are buried is

  • 8/14/2019 Security Notes 1

    17/29

    also a factor and there is an inverse relation between the probability of detection and the width ofdetection. The shallower the depth, the higher the probability, but the detection width is narrower. The

    deeper the depth, the lower the probability, but the wider the detection width.

    Frozen soil is not conducive to this type of sensor and seismic noise may cause nuisance alarms. Some

    seismic noise such as wind energy cause fences, poles, and trees to shake. Other sources includevehicular traffic and heavy industrial machinery. If the location of the sensor line is known, a bridge could

    be formed over the line to defeat this type of system (Garcia, 2001).

    Diagram 1. Pressure Sensors. Diagram 2. Seismic Sensors.

    ( Perimeter Security Sensor Technologies Handbook , 2001)

    Magnetic field sensors respond to changes in the local magnetic field caused by movement of metallic

    material. They are ideal for detecting vehicles or intruders with weapons, thus if an intruder has no

    weapons, they would not be detected. They consist of series of wire loops or coils buried in the ground.They can be susceptible to lightning due to the electromagnetic disturbances.

    Ported coaxial cable is also known as leaky coax or radiating cable sensors. They respond to a high

    dielectric constant or high conductivity near the cable that can be produced by humans and metalvehicles. This type of sensor consists of an outer conductor that is not completely shielded from the inner

    conductor and lets some radiated signals leak through (see Diagram 3). Metal or water can causeproblems with these sensors due to them being large targets and cause of nuisance alarms. Also,

    standing metal objects and water distort the radiated field. Bridging over or avoiding the zone is theprinciple method of defeat (Garcia, 2001).

    Diagram 3. Ported Cable Sensor.

  • 8/14/2019 Security Notes 1

    18/29

    ( Perimeter Security Sensor Technologies Handbook , 2001)

    Fiber-optic cables are made up of long, hair-like strands of transparent glass or plastic. Along thesestrands, light travels from one end to the other reflecting off of the surface of the cladding materialmaking it a sort of 'light-pipe' (Garcia, 2001). The light diffraction and intensity is a function of the shapeof the fiber over its length that is measured at the end of the cable by sensitive equipment. If there is adisturbance in the zone, this function is changed and causes an alarm. Bridging over the sensors is thedefeat mechanism and experts recommend using a microwave in conjunction with fiber (see Diagram 4).

    Diagram 4. Fiber Optic Cable.

    ( Perimeter Security Sensor Technologies Handbook , 2001)

    Fence-Associated SensorsT here are three types of sensors that attach to or mount on fences, these are: fence-disturbance

    sensors, sensor fences, and electric field or capacitance. Fence-disturbance sensors are installed onsecurity fences and typically constructed with chain-link mesh. They use several kinds of transducers to

    detect motion or shock caused from an intruder attempting to climb or cut through the fence. Fence-disturbance sensors respond to all mechanical disturbances so noises such and wind and debris blown by

    wind, rain, and nearby traffic activity can cause nuisance alarms (Garcia, 2001). Also, the fence must betight with rigid fence posts. The most common defeat method is to avoid contact with the fence by

    bridging or digging underneath. Furthermore, overhanging trees and nearby structures can assist the

  • 8/14/2019 Security Notes 1

    19/29

    intruder to gain access (see Diagram 5.)

    Diagram 5. Fence-Disturbance Sensors.

    ( Perimeter Security Sensor Technologies Handbook , 2001)

    Taut-wire sensor fences consist of high tensile strength parallel, horizontal wires that connect totransducers near the midpoint of the wire span. Since these wires are under tension, they are able to

    detect climbing or cutting of the wires. They are much less susceptible to nuisance alarms than fence-disturbance sensors. The wire is usually barbed wire and the transducers are mechanical switches, straingauges, or piezoelectric elements (see Diagram 6). The probability of detection of taut-wire is dependentupon the tension of the wires, wire friction, and wire spacing. If the space between the two wires is largeenough, it could allow an intruder to pass through undetected. Like other type of fence-associatedsensors, bridging over or tunneling underneath can defeat this system (Garcia, 2001).

    Diagram 6. Taut-wire Sensor.

  • 8/14/2019 Security Notes 1

    20/29

  • 8/14/2019 Security Notes 1

    21/29

    ( Perimeter Security Sensor Technologies Handbook , 2001)

    Diagram 8. Fiber Optic Fence Sensor. Diagram 9. Combinations of Sensors.

    ( Perimeter Security Sensor Technologies Handbook , 2001)

    Electric field or capacitance sensors can be set to detect up to 1 meter beyond the wire of the fence.

    These sensors are susceptible to lightning, rain, fence motion, and small animals. Also, ice storms maycause damage to the wires. Since the detection volume extends beyond the plane of the fence, they are

    more difficult to defeat than other sensors by digging or bridging over (see Diagram 10).

    Diagram 10. Electric Field Sensors.

  • 8/14/2019 Security Notes 1

    22/29

    ( Perimeter Security Sensor Technologies Handbook , 2001)

    Freestanding SensorsThe most common freestanding sensors used for exterior perimeter control are video motion detection,microwave, and infrared. Video motion detection uses existing closed-circuit television (CCTV) cameras tosense a change in the video signal level viewed on the scene. A computer that is set to recognize

    movement in a particular area, point, or grid on an image usually accomplishes motion detection. Whenthe computer detects a change in the set image under the set parameters, then an alarm is generatedthat indicates there was movement in that set zone. Video motion detection only works with fixedcameras, thus pan/tilt/zoom cameras could not be used since any motion of the camera and the changeof the video image will produce an alarm. Also, reliability of the detection could be lowered duringconditions of reduced visibility caused by fog, snow, heavy rain, or loss of lighting at night (Garcia,2001).

    Microwave sensors use transmitters and receivers working in the 10 Gigahertz (GHz) or 24 GHzmicrowave range. There are two types of microwave sensors, monostatic and bistatic. Monostatic unitscombine the transmitter and receiver in a single dual function unit. A monostatic unit uses two differentfrequencies that rapidly turn on and off, first at the one frequency, then at the second frequency. Thereceiver temporarily shuts off after transmission. Since microwave has a constant speed, the receiver isprogrammed to detect the reflected energy within a specific time period. Of course if it does not receivethe reflection back in a certain time period due to an intruder's movement, then an alarm is activated(see Diagram 11a).

  • 8/14/2019 Security Notes 1

    23/29

    Diagram 11a. Monostatic Microwave Sensors.

    ( Perimeter Security Sensor Technologies Handbook , 2001)

    A bistatic microwave sensor uses two separate units, one for the transmitter, and one for the receiver to

    create a detection zone between the two units. The bistatic microwave sensors respond to changes in thevector sum caused by objects moving in the zone. The vector sum is made up of the microwave signal

    reflected from the ground surface and other objects in the zone (see Diagram 11b and 11c). Threeimportant considerations for microwave are that the ground must be flat so that objects do not shadow

    the beams; antennas should not be placed greater than 120 yards between each other since a crawlermay not be detected due to dead zones created in the first few meters in front of the antennas; and

    there should not be any standing water in the area since this will create a moving reflective zone (seeDiagram 11d) (Garcia, 2001).

    Diagram 11b. Bistatic Microwave Layout. Diagram 11c. Bistatic Microwave Sensors.

    ( Perimeter Security Sensor Technologies Handbook , 2001)

    Diagram 11d. Bistatic Microwave Patterns.

  • 8/14/2019 Security Notes 1

    24/29

    ( Perimeter Security Sensor Technologies Handbook , 2001)

    There are two types of exterior infrared systems. The first is the passive infrared (PIR) sensor thatdetects electromagnetic radiated energy generated by sources that produce temperatures below that ofvisible light. The sensors focus on a narrow bandwidth measured in microns with the human bodyproducing energy in the region of 7-14 microns. These sensors use the Rate of Change measurement toprocess and evaluate an unshielded/unprotected intruder walking through a designated zone. When theradiation change captured by the lens exceeds parameters, an alarm is signaled (see Diagram 12a).Some defeat mechanisms deployed are to shadow, cloak or mask the intruders heat signature from thefield of view. Also knowing the dead spots of the detection pattern can assist an intruder ( ( PerimeterSecurity Sensor Technologies Handbook , 2001) .

    Diagram 12a. Passive Infrared Sensor.

  • 8/14/2019 Security Notes 1

    25/29

    ( Perimeter Security Sensor Technologies Handbook , 2001)

    Active infrared sensors use two units, a transmitter and a receiver much like the bistatic microwaveunits. Unlike the microwave units, the active infrared sensors use a transmitter that generates a multiplefrequency straight-line beam to the receiving unit that creates a sort of 'fence' between these two units(see Diagram 12b). An intruder passing through this field of detection will interrupt the signal and causean alarm. Some consideration for the active infrared sensors is the ability to align the two towerstogether and obtain line of sight. The sensitivity levels on most of the newer sensors can be adjusted foranimals and vegetation to pass through without being detected, but when a human intruder or vehiclepass through, the alarm will activate. Attempts to defeat these sensors may be accomplished by bridgingor tunneling over the 'fence' or by using the towers that house the beams as columns to support anintruder from vaulting over the beams (Garcia, 2001).

    Diagram 12b. Active Infrared Motion Sensors.

  • 8/14/2019 Security Notes 1

    26/29

    ( Perimeter Security Sensor Technologies Handbook , 2001)

    Dual-technology systems are a combination of any of the two above sensors. This gives the entire systeman extra layer of protection, however, the system will only be as good as the weakest part. Specialattention should be made to use such sensors that will enhance each other and attempt to strengtheneach other's weakest part. For instance, passive infrared could be used with microwave sensors to lowerthe false alarm rates. Both sensing elements could be used in a combined unit and through a logical'AND' function, an alarm could be set off if certain parameters are met. For example, the infrared sensorwould have to activate 'AND' the microwave sensor would have to activate to create an alarm that anintruder was detected. (Garcia, 2001)

    Emerging TechnologySome other emerging technologies for exterior perimeter control systems are using 3-D video motiondetection and airborne intrusion detection. In the video realm, thermal-imagers are being deployed in anattempt to monitor very wide areas. For airborne detection, radar, vibration, imaging, and othertechnologies are being applied to detect an intruder through the air. Most of these technologies are underdevelopment and have not been fully tested. They are cited here to show that security is an ever-changing world and there are always work being done to develop better systems (Garcia, 2001).

    Final CommentAlthough there are many different systems to choose from, this author's recommendation is for theactive infrared perimeter detection system, specifically the one designed by Aressco Technologies, Inc. inHomestead , FL. To get further information on this system, go tohttp://www.solarbeam.com . Out of allof the systems talked about, the SolarBeam SPT2000 is one of the best, state-of-the-art perimetersecurity systems on the market. "The SPT2000 is a totally wireless, solar powered outdoor perimetersecurity system designed to provide perimeter protection where power and wiring are difficult or virtuallyimpossible to install" ( SolarBeam, 2001). This system consists of polycarbonate, weatherproof towersthat have four RedNet I. R. Beams installed inside. 12-volt batteries power the beams and the batteriesare recharged by the included solar panel. The beams comprise of four transmitters and four receiversthat see each other making a 16-beam path 'fence' (see Diagram 13). These towers can be placed up to400 feet apart with line-of-sight and Aressco's patented RF transmitter/receiver can transmit up to 5

    http://www.solarbeam.com/http://www.solarbeam.com/http://www.solarbeam.com/
  • 8/14/2019 Security Notes 1

    27/29

    miles (and longer with repeaters), making this system totally portable and reusable. An entire systemcan be installed in a few hours (depending on the number of towers required). Regarding the price, this

    system is one of the most cost-effective and efficient systems on the market. The author knows from firsthand experience that this system operates above a 95% probability of detection rate with over 95%

    confidence level. Since there is a black acrylic cover, no one can see how the beams are mounted orwhere the beams are pointing. Placing an anti-tamper proof switch in the tower stops all attempts of

    using the towers themselves as avenues of intrusions ( Intrusion Detection Systems , 2001). This systemis not susceptible to lightning strikes and/or electromagnetic interference. Due to its protective coverings

    on the outside and inside, this system is totally weatherproof and can handle all types of environments.The towers can be utilized in many different applications ranging from nuclear power plant protection to

    airport perimeter security. The goal of any perimeter system is to have the best possible detection rate inthe most cost effective manner. This can be a very difficult task to accomplish, however, the SolarBeams

    will give the best possible perimeter security available for the best price.

    Diagram 13. SolarBeam Paths.

    ( SolarBeam SPT2000 , 2001)

    Ccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc

    Bullet proof material for curtains

    Ballistic Fabric, bulletproof fabric, bullet proof curtains and material

    High performance PE UD fabric is made of high tenacity and high modulus PE fibre, which isuniformly spread by advanced high-tech machines, elastic resin soaked and gelatinized with

    http://oliverchou.trustpass.alibaba.com/product/103240120-0/polyamide_fabric.htmlhttp://oliverchou.trustpass.alibaba.com/product/11413384-10914371/High_Strength_Vectran_Fiber_Fabric.htmlhttp://oliverchou.trustpass.alibaba.com/product/107960430-10652325/heracron_fiber_fabric_180gsm.html
  • 8/14/2019 Security Notes 1

    28/29

    films, and two-cross laminated. The fibre is soft, low-density, anti-erosion, anti-shock andanti-cut, and widely applied in soft bulletproof vest, lightweight bulletproof helmet, lightweightbulletproof plate, stab proof vest and public anti-riot equipment as well as used to absorbenergy as bullet proof curtains. Its the highest tenacity and lowest density bulletproofmaterial in the world.

    Bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb

    Anti seismic concrete (Guys & Heidi makethis for the purpose of bomb proofing)

    A method of achieving earthquake reinforcement in existing buildings by pilinghourglass-shaped concrete blocks within a beam pillar frame structure of a wall. Theblocks are piled by staggering by half one pitch of the layer of concrete blocks and byfilling the whole area within the beam pillar frame. The blocks are provided with studplates that are welded to supporting bands which are in turn connected to the frame.

    Seismic retrofitting is the modification of existing structures to make them more resistant toseismic activity, ground motion, orsoilfailure due to earthquakes. With better understanding ofseismic demand on structures and with our recent experiences with large earthquakes near urbancenters, the need of seismic retrofitting is well acknowledged. Prior to the introduction ofmodernseismic codesin the late 1960s for developed countries (US, Japan, NZ etc) and late 1970s formany other parts of the world (Turkey, China etc),[1], many structures were designed withoutadequate detailing and reinforcement for seismic protection. In view of the imminent problem,various research work has been carried out. Furthermore, state-of-the-art technical guidelines forseismic assessment, retrofit and rehabilitation have been published around the world - such as theASCE-SEI 41 [2] and the New Zealand Society for Earthquake Engineering (NZSEE)'s guidelines [3].

    The retrofit techniques outlined here are also applicable for other natural hazards such as tropicalcyclones, tornadoes, and severewindsfromthunderstorms. Whilst current practice of seismicretrofitting is predominantly concerned with structural improvements to reduce the seismic hazardof using the structures, it is similarly essential to reduce the hazards and losses from non-structuralelements. Methods of reducing hazards within households and general disaster preparation arefound in the related articleHousehold seismic safety. It is important to keep in mind that there is nosuch thing as an earthquake-proof structure, althoughseismic performancecan be greatly enhancedthrough proper initial design or subsequent modifications.

    [edit] Retrofit StrategiesMany seismic retrofit (or rehabilitation) strategies have been developed in the past few decades following theintroduction of new seismic provisions and the availability of advanced materials (e.g. fiber-reinforced polymers,FRP, fiber reinforced concrete and high strength steel)[4]. Retrofit strategies are different from retrofit

    techniques, where the former is the basic approach to achieve an overall retrofit performance objective, such asincreasing strength, increasing deformability, reducing deformation demands while the latter is the technicalmethods to achieve that strategy, for example FRP jacketing (see Figure 2a).

    Increasing the global capacity (strengthening). This is typically done by theaddition of cross braces or new structural walls.

    Reduction of the seismic demand by means of supplementary damping and/oruse ofbase isolation systems [5].

    Increasing the local capacity of structural elements. This strategy recognisesthe inherent capacity within the existing structures, and therefore adopt a morecost-effective approach to selectively upgrade local capacity

    (deformation/ductility , strength or stiffness) of individual structuralcomponents.

    http://en.wikipedia.org/wiki/Built_environmenthttp://en.wikipedia.org/wiki/Seismologyhttp://en.wikipedia.org/wiki/Soilhttp://en.wikipedia.org/wiki/Soilhttp://en.wikipedia.org/wiki/Earthquakehttp://en.wikipedia.org/wiki/Built_environmenthttp://en.wikipedia.org/wiki/Built_environmenthttp://en.wikipedia.org/wiki/Built_environmenthttp://en.wikipedia.org/wiki/Retrofithttp://en.wikipedia.org/wiki/Tropical_cyclonehttp://en.wikipedia.org/wiki/Tropical_cyclonehttp://en.wikipedia.org/wiki/Tornadohttp://en.wikipedia.org/wiki/Windhttp://en.wikipedia.org/wiki/Windhttp://en.wikipedia.org/wiki/Windhttp://en.wikipedia.org/wiki/Thunderstormhttp://en.wikipedia.org/wiki/Thunderstormhttp://en.wikipedia.org/wiki/Thunderstormhttp://en.wikipedia.org/w/index.php?title=Household_seismic_safety&action=edit&redlink=1http://en.wikipedia.org/w/index.php?title=Household_seismic_safety&action=edit&redlink=1http://en.wikipedia.org/w/index.php?title=Household_seismic_safety&action=edit&redlink=1http://en.wikipedia.org/wiki/Seismic_performancehttp://en.wikipedia.org/wiki/Seismic_performancehttp://en.wikipedia.org/wiki/Seismic_performancehttp://en.wikipedia.org/w/index.php?title=Seismic_retrofit&action=edit&section=1http://en.wikipedia.org/wiki/Base_isolationhttp://en.wikipedia.org/wiki/Built_environmenthttp://en.wikipedia.org/wiki/Seismologyhttp://en.wikipedia.org/wiki/Soilhttp://en.wikipedia.org/wiki/Earthquakehttp://en.wikipedia.org/wiki/Built_environmenthttp://en.wikipedia.org/wiki/Built_environmenthttp://en.wikipedia.org/wiki/Retrofithttp://en.wikipedia.org/wiki/Tropical_cyclonehttp://en.wikipedia.org/wiki/Tropical_cyclonehttp://en.wikipedia.org/wiki/Tornadohttp://en.wikipedia.org/wiki/Windhttp://en.wikipedia.org/wiki/Thunderstormhttp://en.wikipedia.org/w/index.php?title=Household_seismic_safety&action=edit&redlink=1http://en.wikipedia.org/wiki/Seismic_performancehttp://en.wikipedia.org/w/index.php?title=Seismic_retrofit&action=edit&section=1http://en.wikipedia.org/wiki/Base_isolation
  • 8/14/2019 Security Notes 1

    29/29

    Selective weakening retrofit. This is a counter intuitive strategy to change theinelastic mechanism of the structure, whilst recognising the inherent capacity ofthe structure. [6]

    [edit] Retrofit Performance ObjectivesIn the past, seismic retrofit was primarily applied to achieve public safety, with engineering solutions limited by

    economic and political considerations. However, with the development ofPerformance based earthquakeengineering (PBEE), several levels of performance objectives are gradually recognised:

    Public safety only. The goal is to protect human life, ensuring that the structurewill not collapse upon its occupants or passersby, and that the structure can besafely exited. Under severe seismic conditions the structure may be a totaleconomic write-off, requiring tear-down and replacement.

    Structure survivability. The goal is that the structure, while remaining safe forexit, may require extensive repair (but not replacement) before it is generallyuseful or considered safe for occupation. This is typically the lowest level ofretrofit applied to bridges.

    Structure functionality. Primary structure undamaged and the structure isundiminished in utility for its primary application. A high level of retrofit, thisensures that any required repairs are only "cosmetic" - for example, minorcracks in plaster, drywall and stucco. This is the minimum acceptable level ofretrofit for hospitals.

    Structure unaffected. This level of retrofit is preferred for historic structures ofhigh cultural significance

    Vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv

    http://en.wikipedia.org/w/index.php?title=Seismic_retrofit&action=edit&section=2http://en.wikipedia.org/w/index.php?title=Performance_based_earthquake_engineering&action=edit&redlink=1http://en.wikipedia.org/w/index.php?title=Performance_based_earthquake_engineering&action=edit&redlink=1http://en.wikipedia.org/wiki/Plasterhttp://en.wikipedia.org/wiki/Drywallhttp://en.wikipedia.org/wiki/Stuccohttp://en.wikipedia.org/wiki/Hospitalhttp://en.wikipedia.org/w/index.php?title=Seismic_retrofit&action=edit&section=2http://en.wikipedia.org/w/index.php?title=Performance_based_earthquake_engineering&action=edit&redlink=1http://en.wikipedia.org/w/index.php?title=Performance_based_earthquake_engineering&action=edit&redlink=1http://en.wikipedia.org/wiki/Plasterhttp://en.wikipedia.org/wiki/Drywallhttp://en.wikipedia.org/wiki/Stuccohttp://en.wikipedia.org/wiki/Hospital