MODERN SECURITY SYSTEMS FOR PERIMETER PROTECTION OF AIRPORTS

Size: px
Start display at page:

Download "MODERN SECURITY SYSTEMS FOR PERIMETER PROTECTION OF AIRPORTS"

Transcription

1 281 MODERN SECURITY SYSTEMS FOR PERIMETER PROTECTION OF AIRPORTS Mieczyslaw SZUSTAKOWSKI 1 - Wieslaw CIURAPINSKI 2 - Norbert PALKA 3 - Marek YCZKOWSKI 4 - Krzysztof RUTYNA 5 Abstract: During the last few years we could observe development of the security systems dedicated for airports connected mainly with terrorists threats. In the past, terrorists and bombs penetrated chiefly through terminals so the main efforts were focused on improving passenger and baggage screening. After the September 11 terrorist attacks, all aspects of airport security were analyzed. Dramatic contrast between protection of terminals and perimeter zones was revealed. Inspections showed easy access to important critical infrastructure: flying controls, airstrips, fuel storages, hangars etc. This paper will present basic elements of perimeter systems and their functions in the most important action - safe and effective intervention. Various variants of perimeter protection will be shown. The presented conceptions can be applied for practical implementation for existing or new-built airports. Keywords: security systems, perimeter protection 1. INTRODUCTION Through five last years, particularly on TSA s initiative and financial recourses, the technology for construction electronics perimeter security systems extensive areas of the airport has been unreeled and organizational and technical systems of full outside security were adapted and worked out. Currently a complex structure of the perimeter security of the port is taken. (Figure 1) The first layer, as the physical obstacle, is supposed to stop (to delay) attack. The other detect the ensure keeping track of intruder s moves. Third-one to intervene and make the intruder powerless before he does damages. Protect Detect Respond Function Physical Fencing Signage Video Surveillance Intelligent CCTV Security Manpower Network Integration Command & Control Centre Alarm signal Taut wire Sensors Chain Link Concrete Barriers CCTV Cameras Thermography Infrared Cameras Intelligent Video Software Wireless Networking Monitoring Capabilities Procedural Action Interoperable Solutions Command, Control & Communication Security Procedures Organization Situational Awarness Equipment Personnel System Integration Factors Conditioning Safety Figure 1 A layered structure of the perimeter security of the port In the completion of the effective perimeter safety of ports is assumed cooperating of three factors: technical security, organizational procedures and airport security services Prof., Ing., Dr.; mszustakowski@wat.edu.pl, 2 Kaliski Str Warsaw, +48 (22) Ing., Dr.; wciurapinski@wat.edu.pl, 2 Kaliski Str Warsaw, +48 (22) Ing., Dr.; npalka@wat.edu.pl, 2 Kaliski Str Warsaw, +48 (22) Ing., Dr.; mzyczkowski@wat.edu.pl, 2 Kaliski Str Warsaw, +48 (22) Ing., Dr.; krutyna@wat.edu.pl, 2 Kaliski Str Warsaw, +48 (22)

2 282 Proceedings of the International Scientific Conference Modern Safety Technologies in Transportation 2007 The technical elements of perimeter security are building as a combination of electronic fences, CCTV, video detection, intelligent video surveillance, termovision and radars. The core of the security system making the network system and Monitoring Center with an intervention patrol control system (Command, Control and Communication (C3)). 2. CONDITIONS OF THE AIRPORTS SECURITY RANGE We understand the outside perimeter airports security as a safeguard of the territorial border of the airfield. The boarders of polish airports, is consisting of the fence with gateways enabling pedestrians and vehicles to have access to the airport. Till 11.VIII.2001 the district security of airport and airports s peripheral territory was protected by passive fences and gateways controlled by permanent posts and patrols of Airport security. Few months after the terrorist attacks in USA George Bush, the president, signed the act about Safety of Aviation and Transport. Under this act in Ministry of Transport the TSA was existence into being. It was located in the Department of Homeland Security (DHS). TSA activity has had a huge influence on the development for technology and the conception the security of airports in entire world. A supervision of the safety of the all kinds transport was confided TSA. On the base of the control and analyses of the susceptibility of ports to terrorist attack TSA determined three areas which require urgent action in order to: - improve in the airport perimeter protection over/on build smart fences and control access of vehicles and pedestrians in gates, - tightening the control of persons who have access to guarded areas in the airport, - tightening the control of persons working at the airports open area. These undertakings were supposed to contribute to increase the safety of air transport. In 2004 TSA worked out and recommended to the implementation Risk Management Approach. This methodology is giving the course of the proceedings in the assessment of threatening the port recommending three stages: - assessment of the risk taking into consideration such authorities as political situation, factors attracting the attention of terrorists and their past activity, - assessment of the infrastructure s susceptibility to terrorist and sabotage attacks, - assessment of critical points in the airport infrastructure and the organization of functioning. On the basis of results of the assessment of risks securing undertakings are taken. They are aspiring to counteract risks and making losses smaller. TSA defined zones of risks of the airfield (Figure 2) and worked out, applying to this time, requiring their protections. Figure 1 shows the diagram of safety zones of the typical airfield. Requirements were defined only for zones SIDA (Security Identification Display Area), AOA (Air Operations Area) i SA (Sterile Area). TSA didn't formulate similar requirements for perimeter security. This organization announced doing it later. In 2004 appeared a report on the control of TSA activity made out by GAO (Government Accountability Office) [1] entitled Further Steps Needed to Strengthen the Security of Commercial Airport Perimeters and Access Control. The report is paying attention to fact that financial and organizational effort to protect activity of airports mainly focus on the control and illuminating luggage and observation and the monitored access inside terminals preferring protecting the road of the passenger from entering to terminal to the door of the airplane. Opened area (airport infrastructure) of an airport are still secured poorly or completely unchecked. The report recommends to TSA focusing its attention on the perimeter security. It shows the susceptibility of passive fences to hidden making out persons and vehicles. The report is also paying attention, that TSA has no conception for behind security of entering a race or landing aeroplanes against the manual rocket launchers fire (MANPADS). Terrible in effects terrorist attacks in Madrid (2004) and London (2005) speed up installations of technical security measures, especially ports at a junction point supporting the international movement.

3 283 Figure 2 Diagram of zones of the safety of an airport [1] Lack of formal regulations, especially within the scope of the perimeter security, and increasing with the use new technologies costs cause that the ports security remains seriously individualized issue in every single European state. 3. DEVELOPMENT OF THE PERIMETER AIRPORT SECURITY 3.1 The passive fence and the physical control of entry gates A few years ago passive fence around the area was a synonym of a perimeter security. At the same time the road, enabling the control of damages in fence, had been built. Technical gates were locked to padlocks and other gates were controlled by guards. The fence fulfilled preventive functions. It made impossible for animal or casual passer-by to rush into the land of the port. Together with the rise of terrorist risk it all showed a need for introduction of the electronic intruder detection. 3.2 One-dimensional active fence with electronic access control The active fence conception assumed modernization of the passive fence spread by giving the line of electronic sensors along the fence and introduction of the vehicles and persons access control systems. The perimeter security systems developed independently of airports need and they were and they are used in military bases and power stations. In the first phase/stage works adapting existing systems to requirements of port ring roads were taken. Using CCTV cameras was transferred into the similar way. They were located along the fence and coupled with sensors of the active fence what complemented the linear one-dimensional system of the perimeter security. Companies of the security business worked teletransmission systems integrating individual one-dimensional systems. They integrated alarm signals of the monitored access and the vision on servers of individual systems in the Supervision Centre. This system is not able to define direction of the intruder s movement and keep track of his move or determine the composition of the group. In that situation intervention patrol has to look for the intruder on the airfield not knowing direction of his relocating. 3.3 Spatial surveillance of the linear perimeter security system and the airfield In order to eliminate faults in the linear security systems a system in the second line for the wide-angle detection was introduced. It envelops sections with the reach of several few hundred metres of the fence and deep into beyond lines. The second line is composite from radars or termovision cameras. It is situated a few hundred metres from the line. It can detect intruder on its own or intercept signal from perimeter sensors and track intruder s moving. Therefore effective intervention is possible. Currently two technologies are used to wide-angle observation of the line radars and termovision. Possibilities

4 284 Proceedings of the International Scientific Conference Modern Safety Technologies in Transportation 2007 of both technologies are different (Figure 3). The radar sweeps the sector or the circle about the set range and detects moveable objects as well as constants ones on the basis of wave reflection. Termovision cameras detect around fixed sector of observation and they require directing in a overstepping place. The operator isn't able to identify an image obtained from these devices. Therefore these devices are usually coupled with CCTV cameras. The patrol is devoid of the chance to monitor situation while being outside the building of the Supervision Centre. System Integrator System Integrator Monitoring Center Perimeter Security Activ Fence SKD CCTV Radar Command & Control IR Switch Security Patrol e n t1g er h t Camera Camera Detection, tracking identyfication RADAR TERMOVISION Detection i lokalization Saction Comunication Sensorsi Gates + SKD Figure 3 Typical elements of the perimeter security system of airport

5 Intervention management system of guards (Command & Control) Effective and safe intervention of the airports patrol is an effect of appropriate action of the entire system of the perimeter security. It requires equipping the patrol with units of video signals receiving, devices to sense of geographical direction and radio communication devices. To sum up, building the C&C system requires: dedicated radio contact and showing the real situation on the digital map in Supervision Center and transmitting it to patrols. 3.5 System of recognizing (familiar - unfamiliar) Applying radar technology lets build the system, which will enable to active recognize people and vehicles on the apron area where their move is allowed. It is the latest technology, led into security systems at the moment. 3.6 Monitorng Center communication inside system If we assume that we used radars for the two-kilometres detection in the second line we can divide the entire perimeter of the airfield to sectors about the length of the 3 km order. We can put there communications stations with communicating devices (sensors, cameras, radars) from the centre. In this way, we will receive sector structure of securities. The entire signal and vivid information have to be handed over and processed in final devices in Monitoring Centre. Devices of active fence, access control system, CCTV systems, radar and termovision systems and Command & Control system should be found there. The communication of sector electronic stations is organised itself on the base of fibre 1Gbit LAN transmission. The C&C communication is a radio type. 4. COMPANIES AND SYSTEMS OF THE AIRPORT PERIMETER SECURITY As it is described in the chapter three, the security system integrates row of different technology systems. In the world there isn t the company which could be a producer of all technologies. A corporation of companies is coming into existence with the company leading as a rule. It works out software system integrating remaining technical systems. Companies don t usually give thorough descriptions of their systems. It is possible to list from known published systems: - System SHIELD by THALES [3] - System Magnet-Fortis firmy Magal Security [4] - The Integrated Airport Security Systems (IASS) firmy Raytheon [5]. In March 2006 the company "Frost & Sullivan" in its study "WORLD AIRPORT PERIMETER SECURITY MARKET" gave the list of companies acting on the world market of the perimeter security of ports (Table 1). Companies possessing one of three technologies: perimeter systems, TV systems and 3C systems were mentioned in the table. In its study the company "Frost & Sullivan" introduced results of the ranking of companies which were found best at five favoured categories: Bisiness Development Strategy Leaderhip FLIR, Customer Service Leadership - ADT, Brand Development Strategy Leadership - Thales, Competitive Strategy Leadership - Magal Security Systems, Vertical Market Penetration Leadership - Cisco Systems.

6 286 Table 1 Proceedings of the International Scientific Conference Modern Safety Technologies in Transportation 2007 Title of the table

7 CONCLUSION As it is resulted from the taken analyses carrying out safe and effective intervention can be assured only by the Command & Control system as a last cell of the security. This system is a structure technically and software very compound. His construction requires the cooperation of many specialist companies. Comprehensive security system is a very much expensive investment. Laying out the building of the system into stages is appropriate. However the destination state of the system should be designed earlier and thoroughly carry out in individual stages. REFERENCES 1. GAO Aviation Security: Further Steps Needed to strengthen the Security of Commercial Airport Perimeters and Access Control Airport Security Transportation - THALES. 3. Magnet Fortis perimeter security systems. MAGAL. 4. The Integrated Airport Security System. 78 th annual American Association of Airport Executives Conference. San Diego, April World Airport Perimeter Security Markets. Frost & Sullivan. March Handbook of Intrusion Detection Sensors. SPAWAR System Center, Homelend Security Office, USA, September Opponent: prof. Ing. Tobias LAZAR, DrSc.; Faculty of Aeronautics, Technical University of Kosice, Rampova 7, Kosice, SLOVAKIA, tobias.lazar@tuke.sk

Security at San Onofre

Security at San Onofre Security at San Onofre April 16, 2015 Ross Quam Security Manager Overview 1. Mission 2. Adversary Characteristics 3. Plans and Procedures 4. Insider Mitigation 5. Local Law Enforcement Agency Support 2

More information

Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland

Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland B. Wieland Swiss Federal Office of Energy, CH 3003 Berne, Switzerland ABSTRACT: The presentation describes the

More information

Totally Wireless Video Security

Totally Wireless Video Security Traditional Video Surveillance ($50,000+) vs. Event-Based Videofied Solution ($2,500) Executive Summary: Totally Wireless Video Security has been effective but cost and complexity has limited deployment

More information

How to Solve the Most Persistent Problem in Perimeter Security Systems

How to Solve the Most Persistent Problem in Perimeter Security Systems How to Solve the Most Persistent Problem in Perimeter Security Systems Duane Thompson General Manager of Fiber SenSys Carrondo, Antonio Commercial Manager, Teleprinta Perimeter Security Challenging!! More

More information

visit us on the web at: www.strategicsecuritycorp.com

visit us on the web at: www.strategicsecuritycorp.com CAMERAS & ALARMS Closed Circuit Television (CCTV) / SMART Home Structured Wiring & Systems Commercial and Residential Alarm Systems / Central Monitoring Integrated Access Control Systems (Proximity Cards,

More information

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings Security-in-Depth Physical Security Webinar Host: Danny Jennings Physical Security Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military; over

More information

Why secure PV fields. Why choose a fence-mounted intrusion detection system

Why secure PV fields. Why choose a fence-mounted intrusion detection system SECURE YOUR ENERGY Why secure PV fields To safeguard the investments made for the construction of a PV field, a security solution to protect the site against the theft of the panels and the acts of sabotage

More information

Aerodrome Advisory Circular

Aerodrome Advisory Circular Aerodrome Advisory Circular AC(AD) NO-13 Integration of International Aviation Security (AVSEC) Measures into Designs and Constructions of New Facilities and alterations to Existing Facilities. CIVIL AVIATION

More information

Protecting your Home Business Future

Protecting your Home Business Future Eurotech Security Systems plc Protecting your Home Business Future Eurotech has been providing quality security systems and high levels of service for more than 25 years Our business customers vary from

More information

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Cyber Threats in Physical Security Understanding and Mitigating the Risk Cyber Threats in Physical Security Understanding and Mitigating the Risk Synopsis Over the last few years, many industrial control systems, including security solutions, have adopted digital technology.

More information

Secure Ports Solutions

Secure Ports Solutions Solutions Grupo Revenga is a leading provider of telecommunications and information technology solutions, electronic security and energy efficiency. The company offers comprehensive end-to-end solutions

More information

Surveillance and Security Technologies for Bridges and Tunnels

Surveillance and Security Technologies for Bridges and Tunnels Surveillance and Security Technologies for Bridges and Tunnels Sheila Rimal Duwadi, P.E., Team Leader Bridge Safety, Reliability and Security, Federal Highway Administration, 6300 Georgetown Pike, McLean

More information

U.S. DoD Physical Security Market

U.S. DoD Physical Security Market U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request

More information

I N T E LLIGENCE WATC H. Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities

I N T E LLIGENCE WATC H. Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities I N T E LLIGENCE WATC H Ireland s only 24/7/365 CCTV intruder monitoring services with dedicated back up facilities WELCOME TO I-WATCH i-watch (Intelligence Watch) provides monitoring services for residential

More information

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist

More information

Physical Security for Drinking Water Facilities

Physical Security for Drinking Water Facilities Physical Security for Drinking Water Facilities December, 2009 State of Oregon Oregon Health Authority Drinking Water Program In Association with The City of Gresham Water Utilities The City of Portland

More information

WEBFIL LIMITED. Your Security Partner

WEBFIL LIMITED. Your Security Partner WEBFIL LIMITED Your Security Partner ABOUT THE COMPANY WEBFIL is a state based company under the Andrew Yule Group. Andrew Yule & Co. Ltd. a Government of India Enterprise is multi product, multi unit

More information

Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response

Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response International Biological Threat Reduction Department Sandia National Laboratories

More information

UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS

UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS 1 DIPLOMATIC SECURITY PROTECTS The Bureau of Diplomatic Security is the security and law enforcement arm of

More information

Commercial proposal Fiber-optic security system SOKOL (Falcon) Calculation do it of Customer (End User) data is 40 kilometers long and 10 Gates

Commercial proposal Fiber-optic security system SOKOL (Falcon) Calculation do it of Customer (End User) data is 40 kilometers long and 10 Gates 103d West Coast Road, Glen Eden TO: Ministry of Transport The Government Company Airports Iraq Baghdad, Iraq Ref. No.: 301\BGD-03-2015 Date 14 th of Mach 2015 Commercial proposal Fiber-optic security system

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction Chapter 1 provides background information on electronic safety and secuirty (ESS), including the definition and areas of knowledge required for an ESS designer. Information contained

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

27558_Xtralis_MultiSiteBrochureREV_Eng_210x297_v1_a4 bro 04/05/2011 16:24 Page 1 Multi-site security

27558_Xtralis_MultiSiteBrochureREV_Eng_210x297_v1_a4 bro 04/05/2011 16:24 Page 1 Multi-site security Multi-site security See the bigger picture THE LEADER IN MULTI-SITE PROTECTION Perimeter protection Facility protection starts at the perimeter, detecting intruders before any potential problems occur.

More information

Security for Railways and Metros

Security for Railways and Metros Security for Railways and Metros Security for Railways and Metros Security Management System Railways and Metros worldwide share a set of characteristics that make them very vulnerable to possible attacks,

More information

Physical Security Reliability Standard Implementation

Physical Security Reliability Standard Implementation Physical Security Reliability Standard Implementation Tobias Whitney, Manager of CIP Compliance (NERC) Carl Herron, Physical Security Leader (NERC) NERC Sub-Committee Meeting New Orleans, Louisiana CIP-014

More information

Technology applied to the most innovative and demanding sectors of the market.

Technology applied to the most innovative and demanding sectors of the market. STE is an Italian medium sized private Systems Integration Company leader in Information and Communication Technology applied to the most innovative and demanding sectors of the market. Established on

More information

Introduction. Industry Changes

Introduction. Industry Changes Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise

More information

BUSINESS JET SECURITY SYSTEM

BUSINESS JET SECURITY SYSTEM BUSINESS JET SECURITY SYSTEM WHAT HAPPENS IF...? A business jet can be subject to a variety of risks, usually when it is parked, often at minor airfields where security can be rudimentary. These risks,

More information

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

DOT IN-DEPTH HAZMAT SECURITY TRAINING PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow

More information

How To Ensure Security At A Site Security Site

How To Ensure Security At A Site Security Site Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers

More information

Surveillance and Security Systems

Surveillance and Security Systems Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose

More information

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade

More information

Advanced Fencing and Security Technologies Ltd

Advanced Fencing and Security Technologies Ltd G.M. Advanced Fencing and Security Technologies Ltd P.O. Box 2327 Kfar Sava Industrial Area 44425, Israel Tel +972-9-7662965 Fax + 972-9-7662964 E-mail: info@gmsecurity.com Website: www.gmsecurity.com

More information

Wisconsin Wastewater Operators Association Physical Security for Facilities. Christopher P. Haase, P.E.

Wisconsin Wastewater Operators Association Physical Security for Facilities. Christopher P. Haase, P.E. Wisconsin Wastewater Operators Association Christopher P. Haase, P.E. Introduction Welcome Security Planning and Evaluation Available Funding Sources Q&A Security Planning and Evaluation History Acropolis,

More information

Security 101 For School Safety. Intertech Associates, Inc. Lunch & Learn

Security 101 For School Safety. Intertech Associates, Inc. Lunch & Learn Security 101 For School Safety Intertech Associates, Inc. Lunch & Learn Safe & Secure Educational Environment What type of school is it? What type of security risks do schools see? How can traffic flows,

More information

Intelligent Home Automation and Security System

Intelligent Home Automation and Security System Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology

More information

STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS.

STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS. STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS. 1. Background: Experience gained in handing terrorism in recent years has shown that with a view to gain widespread media

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management Building Integration System Your platform for customized security and safety management 2 One platform for everything Efficient building management is becoming not only more important, but also a more

More information

Integral Security Solution

Integral Security Solution Integral Security Solution 27th April 2009 Grégoire VIASNOFF Projects & Engineering Center Integral Security Solution Schneider Electric - P&EC Grégoire VIASNOFF 27/04/2009 2 Integral Security Solution

More information

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department

More information

Remote Monitoring offers a comprehensive range of services, which are continually

Remote Monitoring offers a comprehensive range of services, which are continually Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management A Tradition of Quality and Innovation For 12 years, the Bosch name stands for quality and reliability. Bosch is the global supplier of choice for innovative technology, backed by the highest standards

More information

Conducting Security System Site Surveys

Conducting Security System Site Surveys Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM

More information

"NOWA TECHNIKA WOJSKOWA" - 2/2012 COMMUNICATIONS AND INFORMATICS The article is the voice in the discussion on possibilities of data communication solutions integration used in Polish uniformed services

More information

Nuclear Plant Security Systems

Nuclear Plant Security Systems Nuclear Plant Security Systems Course Description Gary W Castleberry, PE This course will introduce the student into the design of security systems for commercial nuclear power plants. An overview of plant

More information

Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT

Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT Physical security information management (PSIM) is a technology solution that provides a platform and applications created to integrate multiple

More information

Intelligent Surveillance & Security Systems

Intelligent Surveillance & Security Systems Intelligent Surveillance & Security Systems Weapon Station (Optional) - Lethal / Non-lethal weapon - Universal Gun Mount Tracking Module - Low light, High resolution Camera - Illuminator - Laser Range

More information

INTRUSION ALARM SYSTEM

INTRUSION ALARM SYSTEM INTRUSION ALARM SYSTEM Case studies reveal most burglars are deterred by the mere presence of an alarm system. Burglars attack unprotected premises considerably more often than ones protected by alarm

More information

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include: Alarm Systems An intruder alarm system is designed to detect intruder presence at your premises. When detected, a siren will activate and communicate an alarm signal to one of our highly sophisticated

More information

ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE THREAT RESPONSE SYSTEM USING STATE OF THE ART INFORMATION TECHNOLOGIES IN THE REPUBLIC OF KOREA

ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE THREAT RESPONSE SYSTEM USING STATE OF THE ART INFORMATION TECHNOLOGIES IN THE REPUBLIC OF KOREA International Civil Aviation Organization WORKING PAPER A38-WP/273 9/9/13 (Information paper) English only Agenda Item 13: Aviation Security Policy ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE THREAT RESPONSE

More information

GATES, GUARDS, AND GADGETS: AN INTRODUCTION TO THE PHYSICAL SECURITY OF IT

GATES, GUARDS, AND GADGETS: AN INTRODUCTION TO THE PHYSICAL SECURITY OF IT GATES, GUARDS, AND GADGETS: AN INTRODUCTION TO THE PHYSICAL SECURITY OF IT Kai Axford, MBA, CPP, CISSP, ACE Manager, IT Security Services Accretive Solutions kaxford@accretivesolutions.com THIS SESSION

More information

EADS-UC3M JOINT CENTER FOR AEROSPACE AND SECURITY SYSTEMS. Image: UC3M photographic files

EADS-UC3M JOINT CENTER FOR AEROSPACE AND SECURITY SYSTEMS. Image: UC3M photographic files EADS-UC3M JOINT CENTER FOR AEROSPACE AND SECURITY SYSTEMS Image: UC3M photographic files 2 The Joint Center for Aerospace Systems Integration is a common platform encompassing university, industry and

More information

Data Security Concerns for the Electric Grid

Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical

More information

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism

More information

SCHEME OF EXAMINATION PG DIPLOMA IN CORPORATE AND INDUSTRIAL SECURITY MANAGEMENT (PGDCISM) ONE YEAR PROGRAMME

SCHEME OF EXAMINATION PG DIPLOMA IN CORPORATE AND INDUSTRIAL SECURITY MANAGEMENT (PGDCISM) ONE YEAR PROGRAMME 62 SCHEME OF EXAMINATION PG DIPLOMA IN CORPORATE AND INDUSTRIAL SECURITY MANAGEMENT (PGDCISM) ONE YEAR PROGRAMME Note: 1. There will be 70 multiple choice questions (MCQ s) in the question paper consisting

More information

Republika e Kosovës Republika Kosovo-Republic of Kosovo Kuvendi - Skupština - Assembly

Republika e Kosovës Republika Kosovo-Republic of Kosovo Kuvendi - Skupština - Assembly Republika e Kosovës Republika Kosovo-Republic of Kosovo Kuvendi - Skupština - Assembly Law No. 03/L-065 ON INTEGRATED MANAGEMENT AND CONTROL OF THE STATE BORDER The Assembly of Republic of Kosovo, On the

More information

Integration of Alarm Systems

Integration of Alarm Systems Integration of Alarm Systems Ing. Jan Valouch Tomas Bata University in Zlin, Faculty of Applied Informatics, Department of Security Engineering, Zlín, Czech Republic valouch@fai.utb.cz Abstract Integrated

More information

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities. 2. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Where applicable, there must

More information

Monitoring of Natural Hazards With the ImpactSentinel Alarming System An Intelligent Solution

Monitoring of Natural Hazards With the ImpactSentinel Alarming System An Intelligent Solution Monitoring of Natural Hazards With the ImpactSentinel Alarming System An Intelligent Solution ImpactSentinel Natural Hazard Sensors und Systems hazard signalization in protection fences overstress, shock

More information

SCADA AND SECURITY DISPATCHES ACCORDING TO PRESENT LEGISLATION IN ROMANIA

SCADA AND SECURITY DISPATCHES ACCORDING TO PRESENT LEGISLATION IN ROMANIA Cristian Silviu BANACU Bucharest University of Economic Studies Emilian Cristian IRIMESCU Bucharest University of Economic Studies SCADA AND SECURITY DISPATCHES ACCORDING TO PRESENT LEGISLATION IN ROMANIA

More information

Does a fence or other type physical barrier define the perimeter of the facility?

Does a fence or other type physical barrier define the perimeter of the facility? PHYSCIAL SECURITY SURVEY CHECKLIST PERIMETER BARRIERS TRANSIT FACILITIES Does a fence or other type physical barrier define the perimeter of the facility? (1) Specify type and height of physical barrier

More information

Security SICE. Security. Cutting edge technology at your service

Security SICE. Security. Cutting edge technology at your service SICE Cutting edge technology at your service Engineering, design and project execution study Functional engineering SICE offers technical assistance providing security consultation and engineering services,

More information

Command and Control Integrated Solutions. Transforming security needs into unique custom-made solutions. Building Technologies

Command and Control Integrated Solutions. Transforming security needs into unique custom-made solutions. Building Technologies Command and Control Integrated Solutions Transforming security needs into unique custom-made solutions Building Technologies A Changing World A Basic Need Our cities become more complex; our transportation

More information

The Premier Fence Mounted Perimeter Intruder Detection System

The Premier Fence Mounted Perimeter Intruder Detection System Microphonic Audio Verification System as Standard Dual Channel Processing which contributes to Low Nuisance Alarms Patented Alpha Sensor Technology Unique Performance Pledge Guarantee The Premier Fence

More information

Vindicator Security Solutions EXTEND YOUR SECURITY PERIMETER. Vindicator Radar Detection System

Vindicator Security Solutions EXTEND YOUR SECURITY PERIMETER. Vindicator Radar Detection System Vindicator Security Solutions EXTEND YOUR SECURITY PERIMETER Vindicator Radar Detection System Extend Your Security Perimeter Many security solutions today are required to provide advanced detection of

More information

PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX

PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX To ensure that policies, procedures, training and physical facilities improvements are implemented in a planned and logical

More information

Physical Security Assessment Form

Physical Security Assessment Form Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...

More information

www.wipro.com Creating Smarter, Secure Airports: The Shift to Integrated Security

www.wipro.com Creating Smarter, Secure Airports: The Shift to Integrated Security www.wipro.com Creating Smarter, Secure Airports: The Shift to Integrated Security Table of Contents Abstract 3 Introduction 3 Airport Security Challenges 4 The Need for an Integrated Airport Infrastructure

More information

File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014)

File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014) File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014) Appendix A -- Minimum Security Standards for Level Federal

More information

DSX-Soft I/O Integration Software

DSX-Soft I/O Integration Software DSX Access Systems, Inc. DSX-Soft I/O Integration Software DSX now has the ability to integrate with various different external devices through serial data streams. This integration allows other systems

More information

CPNI VIEWPOINT 02/2010 PROTECTION OF DATA CENTRES

CPNI VIEWPOINT 02/2010 PROTECTION OF DATA CENTRES CPNI VIEWPOINT 02/2010 PROTECTION OF DATA CENTRES APRIL 2010 CPNI in conjunction with the Sister Banks would like to acknowledge and thank ECA Ltd for their help in the preparation of this report. The

More information

Security Alarm Systems

Security Alarm Systems Security Alarm Systems Monitored alarm systems offer clients peace of mind as they activate on intrusion or tampering at the property and ensure any security alarm will have an appropriate response. However,

More information

Airport Infrastructure Security Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services

Airport Infrastructure Security Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services Airport Infrastructure Security Towards Global Security A Holistic Security Risk Management Approach www.thalesgroup.com/security-services Airport Infrastructure Security Towards Global Security This

More information

Nuclear Security and Incident Response

Nuclear Security and Incident Response Hitachi Review Vol. 62 (2013), No. 3 168 Nuclear Security and Incident Response Kazuhiko Tanimura Hisayuki Ito Hiroyuki Kimura OVERVIEW: Since the Great East Japan Earthquake, there has been a requirement

More information

Safety, Security and Entertainment The Turnkey Solution for all kind of Ships

Safety, Security and Entertainment The Turnkey Solution for all kind of Ships The Turnkey Solution for all kind of Ships SAM Electronics General Safety and Security s and concepts for safety and security are becoming increasingly important in modern times. The change in the worldwide

More information

How To Help With An International Force Mission In The United Nations

How To Help With An International Force Mission In The United Nations Exercise: Using the ISACS AT to Support Physical Security and Stockpile Management ISACS Operational Module 05.20: Stockpile Management: Weapons SCENARIO Context You are on deployment in a foreign country,

More information

Our Hosting Infrastructure. An introduction to our Platform, Data Centres and Data Security. www.in-tuition.net

Our Hosting Infrastructure. An introduction to our Platform, Data Centres and Data Security. www.in-tuition.net Our Hosting Infrastructure An introduction to our Platform, Data Centres and Data Security www.in-tuition.net UK Infrastructure Infrastructure Overview Intuition Networks has provided managed Internet

More information

ABSOLUTE SECURITY. IVRI Group. Corporate Profile December 2012

ABSOLUTE SECURITY. IVRI Group. Corporate Profile December 2012 ABSOLUTE SECURITY IVRI Group Corporate Profile December 2012 About us Chi siamo For over 60 years IVRI GROUPhas been the market leader in Italy for surveillance and the private security sector with a nationwide

More information

High-speed mobile Surveillance in outdoor WiFi Mesh network transmission system planning description

High-speed mobile Surveillance in outdoor WiFi Mesh network transmission system planning description High-speed mobile Surveillance in outdoor WiFi Mesh network transmission system planning description --Applied to the important places (places of demonstration) / abnormal sexual activity area / temporary

More information

Technical Solutions for Major Events

Technical Solutions for Major Events Technical Solutions for Major Events Who are we? The Australian Federal Police (AFP) is the national police of Australia The AFP investigates crime against the Australian Commonwealth including: Terrorism

More information

Homeland Security Solutions

Homeland Security Solutions Homeland Security Solutions Homeland Security - RAD Solutions Many organizations in the public and private sectors today require Homeland Security (HLS) systems: Defense agencies and defense industries,

More information

PRODUCT EXPLORATION. Securing Boundaries with Perimeter and Intrusion Detection Technologies

PRODUCT EXPLORATION. Securing Boundaries with Perimeter and Intrusion Detection Technologies Securing Boundaries with Perimeter and Intrusion Detection Technologies Sharpen Your Senses Perimeter security and physical intrusion detection are crucial for critical infrastructure and large-scale commercial

More information

VIBRANT SECURITY SERVICES

VIBRANT SECURITY SERVICES VIBRANT SECURITY SERVICES My Vision Managing existing business to the best of my ability while having an in-depth understanding of internal capabilities and nurturing these for future success. Growing

More information

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES Northern Border Activities B-1 July 2012 CBP MISSION We are the guardians of our Nation s borders. We are America s frontline.

More information

Technology driven security

Technology driven security Technology driven security The heart of our approach to security is innovation and being resilient to risk. Our priority is to work in partnership with our clients to deliver technologydriven, future-proofed

More information

PRT_INCIDENT DETECTION_TRAFFIC

PRT_INCIDENT DETECTION_TRAFFIC PRT_INCIDENT DETECTION_TRAFFIC TABLE OF CONTENTS 1. Company Profile... 3 1.1 THE ENTERPRISE... 3 1.2 The perfect solution with the right partner... 4 1.3 OUR PHILOSOPHY... 4 1.4 OUR OBJECTIVE... 4 2. Know

More information

Introducing TransitVUE Perimeter IDS, the most advanced perimeter intrusion detection system available today! Protecting Perimeters Around the World

Introducing TransitVUE Perimeter IDS, the most advanced perimeter intrusion detection system available today! Protecting Perimeters Around the World Introducing TransitVUE Perimeter IDS, the most advanced perimeter intrusion detection system available today! Introduction The rising demand for advanced perimeter security detection systems against intrusion

More information

Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems

Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems United States Environmental Protection Agency Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems Office of Water (M 140) EPA 817-B-15-002B May 2015 Introduction A Water

More information

1 HB509 2 176243-1. 3 By Representatives Whorton (I) and Davis. 4 RFD: Boards, Agencies and Commissions. 5 First Read: 07-APR-16.

1 HB509 2 176243-1. 3 By Representatives Whorton (I) and Davis. 4 RFD: Boards, Agencies and Commissions. 5 First Read: 07-APR-16. 1 HB509 2 176243-1 3 By Representatives Whorton (I) and Davis 4 RFD: Boards, Agencies and Commissions 5 First Read: 07-APR-16 Page 0 1 176243-1:n:03/23/2016:FC/mfc LRS2016-1294 2 3 4 5 6 7 8 SYNOPSIS:

More information

3.0 Nonsystem Based Design Descriptions and ITAAC

3.0 Nonsystem Based Design Descriptions and ITAAC 3.0 Nonsystem Based Design Descriptions and ITAAC 3.1 Security 3.1.1 Design Features The physical security system provides physical features to detect, delay, assist response to, and defend against the

More information

12.0 SAFETY AND SECURITY

12.0 SAFETY AND SECURITY 12.0 SAFETY AND SECURITY 12.0 SAFETY AND SECURITY Key points The development plan within this Master Plan: Will improve airfield safety by reducing the towed aircraft runway crossings and other airfield

More information

About the Port Authority

About the Port Authority Thomas Belfiore, Chief Security Officer The Port Authority of New York and New Jersey Testimony for the House Emergency Preparedness, Response and Communications Subcommittee on Protecting our Passengers:

More information

SECURITY AND SAFETY TIPS HOME/RESIDENTIAL SECURITY

SECURITY AND SAFETY TIPS HOME/RESIDENTIAL SECURITY SECURITY AND SAFETY TIPS Below are some vital security tips compiled by the Lagos State Police Command and the state Security Service (SSS) under the instrumentality of the Lagos State Security Council

More information

Beyond security: ATEC s contribution to Birmingham Airport s management systems

Beyond security: ATEC s contribution to Birmingham Airport s management systems Critical infrastructure / transportation Airports Beyond security: ATEC s contribution to Birmingham Airport s management systems As progressive transport hubs such as Birmingham Airport (BAL) invest in

More information

IS-TG501MS IS-TG100MS L-TG700 XS-PLINTH01

IS-TG501MS IS-TG100MS L-TG700 XS-PLINTH01 The Aspects ARTS system is a wireless tracking, audit and security system for works of art and people. The system operates 24/7, which from a security perspective is very important as perimeter or intruder

More information

Optimized Airport Security Infrastructure System (OASIS)

Optimized Airport Security Infrastructure System (OASIS) Optimized Airport Security Infrastructure System (OASIS) Elizabeth Castaneda, Jamie Gonzalez, Shannon Harris, Joon Kim Abstract It has been suggested that the current security measures being implemented

More information

Products. Technology. Services. Delivered Globally. PROTECTING CRITICAL INFRASTRUCTURE SOLUTION

Products. Technology. Services. Delivered Globally. PROTECTING CRITICAL INFRASTRUCTURE SOLUTION Products. Technology. Services. Delivered Globally. PROTECTING CRITICAL INFRASTRUCTURE SOLUTION THE ANIXTER DIFFERENCE Organizations responsible for building and maintaining critical infrastructures face

More information

Ten Tips for Completing a Site Security Plan

Ten Tips for Completing a Site Security Plan TRANSPORTATION LOGISTICS PETROCHEMICal Commercial Industrial Retail Federal Systems Banking Ten Tips for Completing a Site Security Plan Introduction The Chemical Facility Anti-Terrorism Standards (CFATS)

More information