Technology Today. Raytheon s Command, Control, Communications and Intelligence Core Market Delivering Operational Advantages for Our Customers

Similar documents
Novasky Radar Video Surveillance System

KELTRON LS 7000 ALARM MANAGEMENT SYSTEM Keltron Alarm Monitoring, Dispatch, and Reporting Software

Automating Wide Area Surveillance with Radar, AIS, and GPS. Dan Flynn Honeywell July 19, 2007

Integrating & Synthesizing Data for Perimeter Security Awareness

2013 Honeywell Users Group EMEA. Adrian Fielding Security from Day One

Threat Warning System

Sustain.Ability. Adrian Fielding Integrated Safety & Security Honeywell Users Group EMEA

G-MAX IVS R123 Vibration Sensors Perimeter Intrusion Detection System

Perimeter protection for airports with intelligent video surveillance

Airport Perimeter Security

Railways. Security & Operational Communications.

AUTOMATED CLIMBER DETECTION

WG Buried Cable Perimeter Detection System

smart modules An integrated and customised video analytics solution for the real-time events detection

The. Long Beach, California August 14-17, Solutions Network. Physical Security PERIMETER SECURITY TECHNOLOGIES. Leon Snyman GVI Security, Inc.

Session VI Smart safety systems

RFP Addendum 2 March 31, 2016

Government Security Solutions YOUR PARTNER OF CHOICE. Protecting People, Places And Perimeters

Introducing the innovative ipids Indoor Outdoor Detection System MANUFACTURING SECURITY SOLUTIONS

Am I safe working in this building?

Airmux Market. Airmux Family Sept 2013 Slide1

Organize your security with PSIM + software

Base and Deployable Automated Video Surveillance Systems

Organize your security with PSIM + software

Integrated Security Solutions

PERIMETER DEFENCE. Panorama Intruder Detection System Long Range, Day & Night, Automatic Panorama Intruder Detection

- Basic information of Laser Scan detector

DATA CENTER SECURITY. March 2017 Anton Panaitescu

INTEGRATED PERIMETER SECURITY SOLUTIONS

COMMERCIAL BUILDING SOLUTION

Minimal Electric Charge Detection Device for Perimeter Security Systems

RADAR BASED AUTOMATIC INCIDENT DETECTION FOR HIGHWAYS

TARSIER FOD DETECTION SYSTEM TARSIER AUTOMATIC RUNWAY FOD DETECTION SYSTEM

Architectural and Engineering Specification for a Fiber Optic Perimeter Intrusion Detection System. FiberPatrol FP1150

Siemens Enterprise Security. Integrated Security Process. Airports. & Resource Management for Today s Airports. Steve Batt, Market Manager Airports

Architectural and Engineering Specification for a Security Management System. StarNet 2

FlexPS. Architectural & Engineering. Specification for FlexPS. Architectural/Engineering Specification for a

Aviation Solutions. Why Tyco for airports? Our systems help protect over 110 airports. Secures over 80% of UK Airports and more than 60 US Airports

Architectural and Engineering Specification for a Fiber Optic Perimeter Intrusion Detection System. FiberPatrol FP1100X

About HGH Systemes Infrarouges About HGH

Guidance on Video Smoke Detection Technology (VSD)

Traffic Control and Surveillance System (TCSS) Infrastructure, Challenges and Trends

Video Analytics for Perimeter Protection

A basic guide to BS 8418:2015 CCTV Systems for Installers

Overview. Executive Summary. Solution Description CHAPTER

GMS GRAPHICAL MANAGEMENT SYSTEM

Radar technology in surveillance

Traffic control Technologies and incident management

Architectural and Engineering Specification for a Fence-Mounted Perimeter Intrusion Detection System. FlexZone

SUPERYACHT SAFETY & SECURITY 360 AIR, SURFACE & UNDERWATER PROTECTION

Smart Sensing and Tracking with Video and Mote Sensor Collaboration

RADAR-BASED PERIMETER PROTECTION FOR CRITICAL INFRASTRUCTURES

Section PERIMETER SECURITY SYSTEMS

Home Automation. Product info. Marketed By: BlueSilica Technologies For further details write to

Effective Deployment of the Integrated Wireless Network Video Systems for the Homeland Security & Government Sectors

Building Integration System. Your platform for customized security and safety management.

Totally Wireless Video Security

Presented By. BEI Security

Thailand Technology Summit 2016

Integrated Security and Building Automation Technology Solutions and Services. SDI Security Center of Excellence Charleston, SC

Home Intrusion Detection System

Module multisensor system for strategic objects protection

Security Station. Fully Autonomous Intrusion Detection System

I am Rick Jeffress and I handle sales for Fike Video Image Detection. We thank the AFAA for coordinating the venue for this presentation, and we

Professional Perimeter Security Solutions

The IPPS was developed on IBM-PC platform under QNX real time operating system (RTOS) and uses QNX-Windows GUI.

Your best choice for long distances. We don t wait for things to happen. Technology you can believe in. Sharing knowledge

TOTAL PERIMETER SOLUTION

FALCON EYE Land Based Surveillance System

Perimeter Intrusion Detection System

Integrated Security Solutions. A Complete Portfolio

Site Security Plan - Operations Baron Winds Project

About IntraLogic. In Business since 2004 Over 55 Full time employees

WG Buried Fibre Cable Long Perimeter Detection System

Architectural and Engineering Specification for a Fiber Optic Pipeline Integrity Monitoring System. FiberPatrol FP7000

TW-8000 TAUT WIRE FENCE

Preliminary Site Security Plan Operations Cassadaga Wind Farm

Perimeter security using Fibre optics

Corporate Presentation

INTEGRATED PERIMETER SECURITY SOLUTIONS FENCE DETECTION SYSTEMS BURIED CABLE DETECTION SYSTEMS ALARM MONITORING AND CONTROL SYSTEMS MICROWAVE SENSORS

EXPO2015 Managing security using effective Command and Control. May - June 2016

Victor Shapilsky and Adison Ang

Gallagher D10 Tautwire Sensors & D21 Disturbance Sensors Integration with Gallagher

A guide to the changes of Amendment 1 of BS

Success Story Henkel. A WinGuard Reference Project

SAFETY ON A BROADER SCALE Safety and security for people, processes, plants, communities and environment

WIRELESS CCTV. Utility Site Security & Surveillance.

VISEUM UK PRESENTATION

Ekin PATROL The First and Only Smart Patrol of the World

The Fiber SenSys Perimeter Intrusion Detection System From JM Fiber Optics!

SensoGuard. Seismic Security Solutions

Architectural and Engineering Specification for a Real-Time Locating System Flare

Protecting Station Platform & Rail Perimeters. TransitVUE IDS The Latest in Fiber Optic Station Platform & Rail Perimeter Security Sensor Systems

Committed to security

THE BEST SOLUTIONS FOR OUTDOOR PERIMETER PROTECTIONS

MANUFACTURER OF PERIMETER INTRUSION DETECTION SYSTEMS FOR CRITICAL INFRASTRUCTURE AND SENSITIVE SITES

Design of the Fiber-optic Fence Warning System with Distributed Video Real-Time Display Function Qiang-yi YI and Zheng-hong YU *

SMART CITY SAFE CITY. Anvesh Mangalam, IPS Additional Director General of Police, M P Police And Dr. Sandeep Goyal, Senior Principal Scientist, MPCST

Security Considerations for Secure Workplaces

SECURITY SYSTEMS. ipatrol. Unattended ground sensors. indracompany.com

Transcription:

Technology Today HIGHLIGHTING RAYTHEON S TECHNOLOGY 2007 Issue 3 Raytheon s Command, Control, Communications and Intelligence Core Market Delivering Operational Advantages for Our Customers

The Perimeter Intrusion Detection System... assisting the Port Authority of New York and New Jersey Intrusion detection, tracking and assessment 6 2007 ISSUE 3 RAYTHEON TECHNOLOGY TODAY

Raytheon was awarded a $100 million contract in January 2006 to develop the Perimeter Intrusion Detection System (PIDS) for the Port Authority of New York and New Jersey (PANYNJ). PANYNJ operates the world s premier airport system serving almost 90 million passengers annually. These airports John F. Kennedy International (JFK), Newark Liberty International, LaGuardia (LGA), and Teterboro employ close to 70,000 people and represent a combined annual economic contribution to the region of $48 billion. The PIDS mission is to detect, assess and track intruders attempting to gain access into exterior secure areas, and to aid PANYNJ in determining and dispatching the appropriate response forces to counter intrusions. Threats include landside intrusions at all four airports and waterside intrusions at JFK and LGA. PIDS provides a layered, multi-sensor defense against intrusions by employing intrusion detection, tracking and assessment throughout all required secure areas in good and adverse weather. Various sensors ground surveillance radars (GSR), video motion detection-equipped cameras and smart fencing combined with overlapping coverage provide a minimum 95 percent probability of detection (P d ), a low probability of false alarm (P fa ), a low nuisance alarm rate (NAR), and a 99.9 percent operational availability (A o ). Target locations are displayed in real-time on an airport facility map at the operator s control and display workstation (CDW). Upon detection of an intrusion event, PIDS provides an assessment capability based on infrared (IR), low light level, and daylight video cameras in good and adverse weather. Assessment cameras are automatically slaved to the intruder location, and surveillance sensor feedback maintains the camera(s) on the target track. Users may also manually control any assessment camera. Video is displayed to the PIDS users on the CDW and on large screen (46 diagonal) ceiling- or wall-mounted monitors at selected facility locations. There are several components to the user interface presented on the CDW: (1) the facility map with intruder and police vehicle locations; (2) multiple video windows displaying live or recorded video; (3) an event queue, with standard operating procedures automatically displayed based on the selected event s type; and (4) system administration tools. The PIDS operator is able to control all aspects of the system from this single user interface. Wireless mobile communications with Port Authority Police Department officers in the field is also provided. Target locations are displayed on vehicle mounted computers. In addition, officers may view assessment video. Police vehicle locations are also tracked and displayed. These capabilities greatly improve the situational awareness of response forces. PIDS also interfaces with two legacy systems: (1) an Access Control System (ACS); and (2) existing Closed Circuit Television (CCTV) systems. System Requirements Key requirements that drove the system design are: Target Characteristics: These include the target types person, vehicle, watercraft and their cross-sectional area. In general, only the smallest target type needs to be specified, as the system is designed to detect and track such targets. This is typically a person, usually with a cross-sectional area of 0.5 m 2 to 1 m 2. The target speed range should also be specified; a typical range is 0.1 m/s to 30 m/s. Operational Availability: This is expressed as the percentage of time the system is fully available to perform its mission. An A o of 99.9 percent corresponds to a downtime of 8.76 hours/year. The allowed downtime encompasses both total system failure and degraded mode operations, as well as periods of reduced system performance caused by extreme weather. Achieving a specified A o typically involves providing redundancy among system components, and providing overlapping sensor coverage. Environmental Factors: Maximum rain rate is a key parameter impacting sensor performance and consequently A o. A selected rain rate is used in modeling sensor performance. Similar considerations apply to snow, fog and wind. Probability of Detection: The system is designed to detect targets with the specified characteristics under specified adverse weather conditions. Target detection zones are identified, usually around the facility perimeter. Within these zones, a minimum P d of 95 percent is maintained. Probability of False Alarm: False alarms are associated with sensor noise. P fa is specified on a sensor basis. A typical GSR P fa is 10-6. Nuisance Alarm Rate: Nuisance alarms are generated by the system detecting targets that do not satisfy the target characteristics. For example, a small dog or bird may be detected and tracked, even though it may not satisfy the required target characteristics. The NAR is usually expressed as an allowable number of nuisance alarms per detection zone, per specified time period. The achievable NAR is highly dependent on the facility environment. System Architecture and Design The PIDS implementation effort is dominated by the design and construction of the civil infrastructure necessary to support both the sensor network and the mobile communications. Raytheon s approach to designing the physical system architecture begins with facility drawings augmented by site surveys. The drawings show where existing power and fixed communications nodes are located. These existing nodes are employed wherever possible to reduce implementation time and effort. Accurate sensor models for both radars and cameras (visible and infrared), expressed as P d versus range curves, are developed. These curves incorporate weather effects and target characteristics, along with Continued on page 8 RAYTHEON TECHNOLOGY TODAY 2007 ISSUE 3 7

Perimeter Intrusion Detection System Continued from page 7 specific sensor characteristics. This modeling results in a maximum usable sensor range. The power and communications locations contained in the facility drawings are used with the sensor models to develop a sensor network layout. Raytheon s Sensor Terrain Analysis Tool (STAT), which utilizes the P d versus range curves, terrain data including buildings, height restrictions and other topographic constraints, is employed for this purpose. STAT produces a color coded P d map of the entire facility. Low P d areas are corrected by adding additional sensors. The PIDS program was generalized to develop a system concept called the Integrated Security System for Airports (ISSA). Each subsystem is COTS-based, modular in design, with well defined interfaces. This supports future upgrades and expansions as new and improved products become available. The components and functions of each subsystem are described in the following. Intrusion Detection and Tracking Subsystem (IDTS): The IDTS functions as the surveillance sensor front end. Any type of surveillance sensor can be integrated, however, three principal sensor types are usually employed. (1) GSRs are employed in unobstructed areas as the principal means of detecting and tracking targets due to their excellent all-weather capabilities and low cost/m 2 surveillance and tracking capabilities; (2) Video motion detection equipped CCTV and IR cameras are employed in areas with obstructions, typically near facility buildings and other types of structures; and (3) smart fence sensors are employed in low traffic areas as a supplementary means of intrusion detection. Surveillance sensor inputs are collected, processed and fused, and alarms are generated and transmitted to the command and control subsystem. ACS events are also processed within the IDTS and passed to the command and control subsystem. Block diagram of integrated security system for airports Intrusion Assessment Subsystem (IAS): The IAS provides video to assess intrusion events 24/7 in good and adverse weather conditions, thereby assisting users in determining the appropriate response. A combination of visible light and IR cameras are employed to allow assessment in the full range of lighting and weather conditions. The cameras can be operated manually, automatically and in touring mode. In automatic mode, IDTS-generated position data automatically slave a camera to a moving target. Command and Control Subsystem (C2S): The C2S provides the operator interface and event management functions. Both a geographical map and a tabular list representation are displayed to the operator. Alarms from different sources are processed: access control system alarms, perimeter intrusion alarms, loss of communications alarms, low power alarms, tampering alarms, etc. Alarms are prioritized based on user defined rules. The highest priority alarm is always presented to the operator for action. The operator employs video from assessment cameras and standard operating procedures to validate the alarm and react appropriately in concert with security force personnel. The C2S also logs all operator actions and incident data. Communications Subsystem (CS): The CS connects all field components including sensors to computer resources located in server rooms. A high speed (1 Gbps or greater) Ethernet fiber optic network is employed, combining high bandwidth communications necessary for video transport with low communications latency. Mobile data and video communications with response forces are also provided. Power Subsystem (PS): The PS provides the power distribution system and Uninterruptible Power Supplies for all system components interior and exterior. Video Management Subsystem (VMS): The VMS manages all video, including realtime display, replay, storage and archiving. The number of cameras, the video resolution and frame rate, and the video retention period are significant parameters that drive the required video storage capacity. Legacy CCTV systems are accessed through the VMS. In conclusion, Raytheon provides a total solution to our PANYNJ customer, including technology, civil infrastructure design and construction, and maintenance. In addition, the PIDS design, as generalized by the ISSA concept, is also applicable to protecting other critical transportation infrastructure, such as seaports and rail yards. Guy Germana guy_t_germana@raytheon.com Simon Hennin simon_j_hennin@raytheon.com Len Garcia leonard_garcia@raytheon.com 8 2007 ISSUE 3 RAYTHEON TECHNOLOGY TODAY

Copyright 2007 Raytheon Company. All rights reserved. Approved for public release. Printed in the USA. Customer Success Is Our Mission is a trademark of Raytheon Company. Raytheon Six Sigma, MathMovesU and NoDoubt are trademarks of Raytheon Company. Capability Maturity Model,CMM and CMMI are registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.