Integrating & Synthesizing Data for Perimeter Security Awareness ANSI HSSP Perimeter Security Summit May 17, 2005 Mark Bonatucci Lockheed Martin Transportation & Security Solutions Rockville, MD Phone: 301 640 3531 Email: mark.bonatucci@lmco.com 1
Lockheed Martin Transportation & Security Solutions Integrated Electronic Security s As A Market Vertical and Line of Business since 1991 Major Supplier of Integrated Security Solutions to Department of Defense; Department of Transportation; Department of Homeland Security; Large Airports and other Critical Infrastructure throughout the world. Focus is complex large solutions and intelligent systems that integrate cross-functional stakeholders Horizontal Integration; Common Operational Picture; Information for Use HI-View Framework to enable improved situational awareness, incident response and recovery. 2
Data Fusion & Information Synthesis A definition of terms: Data Fusion is an Information Process dealing with the: association, correlation, and combination of data and information from single and multiple sensors or sources to achieve refined estimates of parameters, characteristics, events, and behaviors for observed entities in an observed field of view It is sometimes implemented as a Fully Automatic process or as a Human-Aiding process for Analysis and/or Decision Support Source: An Introduction Data and Information Fusion, 2001, Dr. James Llinas, SUNY Buffalo 3
Current Technology State IDS/ACS Console Integration Based on basic access control & burglar alarm system concepts Alarms are simple on/off events Door/window open Motion sensor trigger Photo-electric Beam contact break Temperature, smoke, or water threshold exceeded Access control implemented with mag strip/ proximity, or smart card badges Alarm monitoring based on text queues and icons displayed on maps Multiple CCTV monitors for remote observation Relay Solely on the Operator to Provide Intelligence and Analysis of the Data 4
HVW_027a P o we r V a ul t 7 0 N PowerEdge 4300 SD PowerEdge 4300 SD PowerEdge 430 SD Current Intrusion Detection Security s Intrusion Detection, Motion Detection Back-up Workstation SOW Concept Users Supervisor Administration Alternate Concept Back-up Workstation Users Administration Video Monitor Bank Event, Alarm Display & Management User Legacy Supervisor Access Control Network Connected Dual Path Intelligent Controller (Field Panel) Card Reader Interface Card Reader Door Lock Request to Exit Door Position To Network Controller Fingerprint Biometric Interfaces RS-485 IRIS HVW_022a Camera Digital Video Recorder Saved Recording Comm Server Event CCD/CAD Workstation Saved Recording CAD Enterprise Server Server CCTV Display Video Monitors and Control Regional Zone Server 1 Area / Zone Alarm Panel Sensor Terminations Radionics IDS Digital Alarm Receiver To Network Lenel/Mercury Controller Vindicator Philips Switch Event Trigger Event CCD Workstation HVW_037a On/off trigger/ threshold sensors IDS Optional IDS Area / Zone AlarmPanel Sensor Terminations IDS Burglar AlarmPanel (s ) (ADEMCO, Caddx, DSC, NAPCO, Silent Knight, Simplex, ESL, Fire-Lite, Notifier, and DMP.) RS-485 Elevators Perimeters Relay 24 HrPoints Outputs Elevators Alarm Controls Inputs Lighting /Operator Controlled Area / Zone AlarmPanel Sensor Terminations Alarm Inputs HVW_023a Environmental Monitoring Sensors CCTV Cameras, Digital Video Recording 5
Lockheed Martin s Intrusion Detection & Security Vision Smarter, more diverse sets of sensors Radar, IR sensors, motion and non-motion sensors, RF spectrum scanners Intelligent Video Able to watch area in view and report alarm or exception conditions Integration of GIS knowledge based, rules-based decision engines and Computer-aided Dispatch (CAD) applications Data Fused at the sensor and data layer level to create easily understood actionable information. More powerful user interface than traditional security systems that integrates dispatch and security management data into a single platform Capable of supporting emergency operations and a command and control hierarchy. 6
HI View TM Modular Security Command & Control Model Provides a Requirements- Driven Architecture that is Low-Cost, Standards-Based, Modular, and Scalable 7
Lockheed Martin s Intrusion Detection & Security Vision GIS with knowledge of sensor activity of the facility and surrounding area Environment Reasoning Track Aggregation Enemy Course of Action Prediction Fused sensor data, information filtering, presentation of clear situation information to the operator HVW_084 Multi-Echelon Shared Understanding Blue Force Context Surface and personnel radar to detect unauthorized objects from a distance Network Connected Dual Path Intelligent Controller (Field Panel) To Network Controller RS-485 Card Reader Interface Biometric Interfaces Other sensors such as IR, motion detection, RF communication monitoring Card Reader Door Lock Request to Exit Door Position Fingerprint IRIS HVW_022a Intelligent video monitors Traditional access control, intrusion detection, motion detection, environmental control sensors 8
A Simple Data Fusion Example PER 2 PER 1PER 3 PER 5 PER 4 PER 6 1.Motion sensors, radar, and IR sensors detect several objects in unauthorized places. Sensor data fusion indicates there is a 96% likelihood that the objects are people. 2. The system tags the entities and using its GIS capability, tracks them and displays their tracks on the facility map. Comm Sig 5.8 GHz Comm Sig 5.8 GHz Comm Sig 5.8 GHz Comm Sig 5.8 GHz PER 2 PER 1PER 3 PER 5 PER 4 PER 6 PER 2 PER 1PER 3 PER 5 PER 4 PER 6 3. From an RF scan analysis, similar unauthorized radio frequencies are detected in the vicinity of the Intruders, indicating there is an 88% likelihood the intruders are part of an organized unit 4. A kinematic analysis of the tracks suggests that one group is heading toward the electrical switching substation and the other group is heading toward a hazardous materials warehouse. 9
Conclusion The Issue At Hand None of These Ideas or Technologies Are Capable of Being Evaluated Against Any of The Standard s In Effect Today Many, Many Functional Users Agree the Capabilities Are Needed and the Concepts Described Provide Real Functional Benefits. These Technologies Were Not Conceivable, Let Alone In the Realm of The Possible When Most of the Current Standards Were Written. Need To Ensure The Standards We Write Today Are Focused On Measures of Effectiveness; Functional Requirements and Functional Performance Enhancement vice the Current Enabling Technology State of the Practice. 10