1 / 11

Comprehensive security system for strategic facilities (1/2)

Comprehensive security system for strategic facilities (1/2). Identifying sick and infected people. Defence of sea borders and other borders. Detecting forbidden substances. Personal identification and access control. Border protection. Situation Centre. Crime prevention.

zach
Download Presentation

Comprehensive security system for strategic facilities (1/2)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Comprehensive security system for strategic facilities (1/2) Identifying sick and infected people Defence of sea borders and other borders Detecting forbidden substances Personal identification and access control Border protection Situation Centre Crime prevention Checkpoint control All subsystems would operate in a single information field. Events occurring in one subsystem can cause a response from another one. For example, a video surveillance camera acquiring a target may cause another subsystem to switch on the projector, lock a door or broadcast a message from the emergency response services. The system can be controlled from any point of the system, using operator console or local control panels anywhere in the world.

  2. Comprehensive security system for strategic facilities (2/2) The software allows for some flexibility in setting the imperatives (the rules automatically followed by the system). Flow charts and diagrams let the operators monitor the condition of the security system and control it using interactive icons. Distributed network architecture provides for creation of flexible and efficient systems of any scale, while the entire system could be configured from one point. All elements of the system, including autonomous controllers and servers, have extensive back-up functions, making it possible to build a system with any level of reliability. A comprehensive security system can provide for truly large security systems comprising thousands of video surveillance cameras and access points and tens of thousands of security sensors. All this equipment would operate in a single information field that could be controlled and monitored from any of dozens of operator workplaces. Since the equipment and the software for all subsystems would be integrated by one company, it ensures high reliability, productivity and functionality of the system. This completely eliminates issues that may arise from integration of systems from various suppliers.

  3. Prerequisites for implementation of the system State border is a line and a vertical plane going along the line determining the limits of the state territory (land, water, mineral resources and airspace) of a country, i.e., the spacial limit of the effect of state sovereignty. Types of threats Objectives of protecting the state border State borders need to be defended in order to protect the state from potentially dangerous adjacent states, to counter potential aggression (armed assault), protect the population, natural resources, cultural values, sovereignty and territorial integrity of the state. • Potential aggression • Terrorism • Smuggling • Illegal migration Safe Border system provides for • collection and analysis of data from various sources, including integrated detectors, customer databases and specialised resources from the Internet to prevent illegal crossing of the border and a broad range of other threats, while guaranteeing safe and legitimate two-way traffic across all types of borders. The Safe Border solutions could be used both for control of state borders and for perimeter protection of special facilities and territories.

  4. Example of a stationary solution for control over vast territories A perimeter protection system is a system of autonomous security detectors of various types, communicating via a radio-channel and combined with subsystems for collection and processing of information. The purpose of the system is to block extended sections of the perimeter when the alarm is triggered. It is used in conditions where installation of power supply and data cables from the detectors to data processing system is complicated, impossible or unfeasible. The system is designed to detect a trespasser with its intrusion detectors and send an alarm to the Data Collection and Processing System (DCPS).A laptop integrated into the system circuit could serve as DCPS. Detectors are autonomous and do not require connection to power supply or data cables. Detectors and repeaters work on solar energy or on high-capacity non-chargeable batteries. The terminal unit is stationary and requires permanent power supply. Maximum distance for signal transmission from the detectors is 8,000 meters, subject to direct radiovisibility and no obstructions. Protection of long spans of borders can be organised by using the function of two-way retransmission of signals with the maximum number of retransmissions equaling 32. One unit of the system can protect a maximum length of 32 km. The system supports operation of up to 40 units on different frequencies.

  5. Basic components and general scheme of security system Automated video and infrared camera units A combination of mechanical barriers with electronic intrusion detectors Mobile surveillance crews with video / infrared / radiolocation equipment Aerostatic balloons, drones and air reconnaissance control centres

  6. Example of an autonomous solution for control over vast territories An autonomous stationary complex for control over vast and scattered territories with CCTV An autonomous stationary video- and thermal-vision CCTV station is designed to organise protection and intelligent video surveillance over vast open spaces and state borders. Functions: • live video surveillance of vast open spaces • videolocation: automatic location and tracking of targets with the use of a pivoting video camera or a thermal camera • intelligent processing of signals from all types of detectors installed along the protected perimeter or along the state border • protection of the system itself • autonomous power supply from wind and solar energy • setting up a communication channel with a remote monitoring station .

  7. Example of a mobile solution for control over vast territories A mobile autonomous station for control over vast territories with a night-time CCTV system This complex is designed for video and thermal-vision CCTV and protection of the perimeter and access to important facilities located at a big distance from stationary complexes. Design of this complex allows for quick deployment and provides for extended autonomous operation. Mobility of the complex is achieved thanks to a collapsible design of its components. It can be transported in a car like UAZ Patriot and deployed at the location within less than 1 hour by a crew of 2 people. The functional characteristics of this complex are identical to those of stationary complexes, with one exception: • autonomous power supply based on solar energy or a gasoline generator

  8. Example of a drone-based solution for control over vast territories • Anti-terrorist protection, security • Technological security, control over the technical condition of the infrastructure • Obtaining information for timely repair or construction • Ecological monitoring • Survey over the situation on land in emergency situations, natural calamities, man-made disasters. Evaluation of the consequences of natural calamities Functions of the system Proposed solution The use of drones (unmanned aerial vehicles) as an instrument for remote monitoring would improve the promptness of data collection and the efficiency of security by selecting the type of drone and useful load taking into account task specifics.

  9. Example of a drone-based solution for control over vast territories A mobile complex for control over vast and scattered territories with CCTV A drone can be controlled from a tablet computer. The stabilisation system is based on the principle of artificial horizon that is corrected with the help of an original patented algorithm. The operator controls the drone by sending the following commands from the tablet: "take off", "land", "go 5m up", "go 5m right", "proceed to a point with coordinates X:Y:Z", etc. The route can be determined on the map and changed during the flight, if necessary. One of the key features of a drone is to take off and fly automatically to the point where an alarm was triggered, broadcasting video from the location of such detector. After a detailed inspection of the disturbed section of the protected perimeter the drone would return automatically to its initial position and land in a fully automatic mode. The radio channel for control and telemetry was designed to meet the noise immunity and data protection requirements. Integrated software provides multi-level protection from operator's errors and improves the reliability of drone operations.

  10. Examples of useful load and control station for a drone A land-based drone control station (stationary), a car-based station (mobile) Examples of useful load that could be carried by drones Gyro-stabilized platform Photo camera Thermal camera High-resolution video camera Video camera The control station would receive telemetric data (altitude, velocity, direction, roll and pitch, deviation from the route, camera position, battery state, control commands, base map, current coordinates) which enables the operator to control location of the drone and flight parameters at any moment of time. The maximal useful load is estimated depending on the task and the technical features of the specific drone. The take-off mass of a drone can range from kilograms to tens of kilograms.

  11. Situation Centre • Receiving information from various sensors and sources of information • Processing and showing the necessary information to an operator • Transmission of information to remote users • Supporting coordination between patrol groups • Providing data based on a single geoinformation platform

More Related