You are on page 1of 16

Entry Control Intrusion Detection and Surveillance System

Entry Control Intrusion Detection and Surveillance (ECIDS) System

Understanding of ECIDS Requirements


Our experience demonstrates that a properly integrated ECIDS system mitigates risk,
controls vehicular and pedestrian access, buys additional response time for any pre-
assessed alarm condition, whether it is the outer perimeter, a protected asset or an
area within a facility while reducing manpower costs. The following graphics depict the
many individual ECIDS technologies that can be used on a stand-alone basis. However,
the key to a project’s success is in our design philosophy, which includes the proper
layering of various technologies that become networked via dual Ethernet counter
rotating rings, the heart of the communications infrastructure, to redundant host
computers at the central and secondary command centers. These various sensors
become integrated through the IT architecture to protect the perimeter, whether
land, water or airside operations. The technologies are selected based on site-specific
requirements, and then fully integrated for both existing and new facilities providing a full
situational awareness allowing detection, assessment and tracking of threats to assets,
employees, visitors and security personnel. It provides the necessary assessment to aid
security personnel in making an appropriate response to detected threats.

Observation
Tower
Entry Control Intrusion Detection and Surveillance System

ECSI’s Entry Control Intrusion Detection and Surveillance (ECIDS) System consists of Entry
Control, Intrusion Detection, and Surveillance Technologies that are integrated into a
Command and Control System using Fiber Optic or wireless communications.

Entry Control

The access control system regulates the passage of authorized vehicles and personnel
into restricted areas, including confirming and issuing badges, PIN’s and/or biometrics for
entry into these areas. For further control of vehicle access, RFID tag readers or Automated
License Plate Readers are deployed to further enhance entry control integrity.

The majority of DoD and DoE facilities have an access control system that is within the
jurisdiction of customer, and its tasks are to limit the entry to restricted areas to authorized
personnel, prevent entry by unauthorized persons, and warn relevant authorities of any
illegal attempt to penetrate a restricted area.

ECSI has implemented its perimeter Entry Control system to operate in conjunction with
the site’s access control system. ECSI programs all the required gate functionality for
vehicle traps, anti-tailgating and safety into the ECSI Entry Control program and interfaces
with the access control system for the access granted or access denied decision.

Smart Gate consists of Radio Frequency Identification (RFID) equipment to read


vehicle tags, personnel card readers (e.g., proximity cards, bar-coded information
on identification cards and the Access Control Card (ACC), biometric validation,
etc.), visual and acoustic devices supplying the Human-Machine Interface to alert the
Security Force (SF) team to identification and threat assessment results, a computer- based
access control system interfacing with the facility databases for rapid identification
of vehicles/ personnel for reasonable traffic flow, and vehicle inspection and entry
denial techniques (e.g., a gate arm, final denial barrier, bollards, go-no-go light
system, under-vehicle surveillance, explosive detection, etc.).

Vehicle and Pedestrian Access Control

ECSI along with El-Go Team offers a complete line of equipment


and accessories for perimeter access control, including

• Fixed, Removable and Hydraulic Bollards


• Hydraulic Barriers
• Electric and Pneumatic Lift Gates
• Mobile Barriers
• Turnstiles
• Parking Lot Systems
• Signage and Warning Lights
• Signal Lights
Entry Control Intrusion Detection and Surveillance System

Gate Runner Detection


Gate Automation relies upon identity systems for drivers and vehicles; traffic control devices
such as lift arm gates, anti-tail gating detection, etc; and denial barriers to control vehicular
traffic at military installations. However, these systems are limited in their total effectiveness
due to the limited ability to provide early warning of a vehicle’s intent to gain unauthorized
access. The final denial barriers are manually operated by a sentry with direct line of sight
vision of the barriers.. That means that the reaction time provided by direct observation or
other detection systems is critical to achieving success.

Speed detection is a proven law enforcement tool that can be applied to early warning of
gate runner attempts. Most available speed detection technology is based on radar, laser,
detection loops or, more recently, camera video analytics. When applied to road traffic
situations the goal is to either provide an automated speed detection tool for the law
enforcement officer or to automate the speed detection and issuance of a traffic violation to
the vehicle owner. Most systems now provide a video image, speed detected and time and
date information. Most systems used by the officer are oriented towards single vehicles
while newer systems can detect multiple vehicles traveling in multiple lanes or in different
directions.

The requirements for speed detection at a gate are dependent upon many factors including
existing gate layout, number of lanes, distance to entry control gates and distance to final
denial barriers. In addition, the placement of exit lanes may present a vulnerability to wrong
way entry attempts that must be addressed at most entry gates. In general, all gates share
a relatively confined area(i.e. short distance) for speed detection making choice of
technology, application and deployment critical. Appendix 1 at the end of this document
provides a comparison of strengths and weaknesses of various commercially available
technologies.

The majority of military base gates have a relatively small number of lanes, in or out and
short distances for detection to allow for adequate reaction time to activate final denial
barriers. For this reason three technologies are considered viable for gate automation
projects, Inductive loops, Microwave Radar and Video Image Processing.

The attraction of Inductive Loops


is that they are already being
installed for safety and gate
sequencing purposes as part of
gate automation projects. These
loops are relatively inexpensive
and easy to install. When
installed properly, they can be
expected to require little maintenance and they are not sensitive to weather conditions.
There is also the possibility that existing loops can be used without any in-ground
modification and require only the addition of the speed monitoring electronics. Loops in the
exit lanes can be configured to detect a vehicle traveling in the wrong direction. One
manufacturer of interest is DCS LTD whose products not only provide speed detection but
also vehicle classification and toll tag correlation for high speed toll collection. The ability of
Entry Control Intrusion Detection and Surveillance System

automatic classification, though not currently a requirement, could be an added correlation


factor for granting access based on automated license plate recognition.

Microwave Radar is the most common above ground system for


speed detection by law enforcement. While more expensive
than the inductive loops, radar may be more cost effective
when used in multi-lane applications. The radar sensor can be
side mounted and configured with multiple detection zones
perpendicular to the traffic lanes. This configuration is not as
accurate as forward looking radar but may be adequate for
speed threshold detection (i.e. vehicles traveling above a certain
speed). The radar can also detect vehicles traveling in the
wrong direction. AGD Systems manufactures a software-
configurable Microwave Radar System that is suitable for multi-
lane speed detection.

High Speed Alarm


Detects speed and can also activate an alarm
whenever a subject /vehicle exceeds a
designated speed. Enables to detect speed
disparities of subjects and vehicles. Data is
displayed on the Speed Graph – one of the 2
Data Graphs that are viewed on the Behavior
Watch main window. The Speed Graph displays
automatically upon activation of a High Speed
Alarm. This graph shows the average speed (%
Field of View, or “FOV” per second) for the
number of objects detected within the alarm’s
ROI.

The following three pages show photos and layout drawings for gate automation at Navy, Air
Force and governmental facilities.
Entry Control Intrusion Detection and Surveillance System

Gate Automation –AFB

Gate Automation –Naval Facility


Entry Control Intrusion Detection and Surveillance System

Gate Automation – Organization(s)

Gate Automation –Air Force Facility


Entry Control Intrusion Detection and Surveillance System

Gate Automation –Governmental Facility


Entry Control Intrusion Detection and Surveillance System

Perimeter Intrusion Detection


To fully protect a facility, defending the facility against unauthorized infiltration is
imperative. Without a secure perimeter, anyone can reach sensitive areas and facilities
without undergoing any security screening. ECSI offers its expertise in planning and
supervising the implementation of smart fences, and developing regulations for patrolling
them. Perimeter security should provide adequate protection for the risk presented by each
area, and should take into consideration financial and operational considerations.

FOIDS® system

The FOIDS® system is a cost effective perimeter


security system utilizing single mode fiber optic cable
and highly sensitive interferometry
technology for intrusion detection along fences and
walls up to a zone length of 3.5 miles. FOIDS can secure
virtually any size perimeter without electrical power or
electronic components outside a central control room.
FOIDS® detects pressure changes along length of zone
including climbing, cutting or pulling of fence.

IPID® System

The Standard IPID® System provides undefeatable perimeter


security using pulsed infrared technology to
create multiple detection zones each with a range of up to
1000 feet. IPID’s use solid state electronics that are not
affected by environmental conditions such as
birds, small animals, snow, puddles, leaves, grass and
mechanical vibrations. It works in rain, snow and fog and
instantly pinpoints the intrusion zone via normally opened
or closed dry contacts that can be interfaced with any
user’s data communication and annunciator, or a data
communication system supplied by ECSI. IPID does not emit
a false alarm. The system will only alarm if an object breaks
the 3.54” diameter beam more than 98.5%.

Perimeter Surveillance
Entry Control Intrusion Detection and Surveillance System

CCTV is currently in use for detecting mostly criminal activity. These cameras can be
adapted to assist in defending against terrorists. Correct positioning of cameras facilitates
early detection of terrorist activity, and monitoring events in case of a security breach.
ECSI offers a review of existing CCTV from a security point of view, and may recommend
adding, or re-locating cameras at key positions, and the necessary technological level for
cost-effective security.

ECSI Long Range Day / Night CCTV

ECSI Long Range Day / Night camera offers imaging systems for any security
application where lighting is impractical, too expensive or where long-range
performance is required. For border security, port security, and critical
infrastructure applications, the system has proven vital to threat detection
initiatives.
The system consists of 360° Endless high speed
heavy duty Pan/Tilt driver with Day-20km, 15km,
6km, 3km, 2km Motorized Zoom true color/Night-
10M~10KM (30,000Ft) image pick-up by 56-strong
“IR” illuminator with collimator & Laser “IR”
illuminator at night (IP66, 20kg)

ECSI Long Range Radar

Potential intruders entering oil fields and refineries, bases, or


crossing borders can now be detected and monitored
remotely using an innovative radar design The radar
systems, named AIMS “Area Intrusion Monitoring System”
operate with uniquely low power and light weight solid state
components. The ability to detect a walking human target
at over 1.5 kilometers using 2 watts of peak power,
continuously scan 360°, and operate 24 hours a day in all
weather, set this system apart from all its competitors.
Vehicles are detected 3-5 km (based on size and
orientation). 3, 5, 7, 10, 12, and 15 km versions of the radar
for a walking human are also available.

The AIMS has the widest temperature specifications on the


market -- -40 to +70 degrees C (ambient air). The AIMS radar has the finest Doppler
(speed) resolution capability on the market. Wind driven affects on the surroundings has
little if any effect on the detection or performance of the system. Even trees found in the
landscape or in parking lots has little effect on the system. AIMS has a low false alarm rate.
AIMS may be installed as a permanent system or provided as a relocatable tripod mounted
system (requires several people to move). AIMS may also be provided as a “turn-key”
system, with monitoring, the radar and cameras all supplied. (Some cameras may require
export licensing.) User interfaces graphically present detections on map overlays. Video can
be provided integrated into the same display.
Entry Control Intrusion Detection and Surveillance System

Fiber –Optic Communications

ECSI International with Meridian Technologies offer a complete and comprehensive line of
digital fiber optic transmission products.

1. Video Transmission Systems


2. Audio Transmission Systems
3. Data Transmission Systems
4. Video & Data Transmission Systems
5. Video & Audio Transmission Systems
6. Data & Audio Transmission Systems
7. Video ; Data & audio Transmission Systems
8. FM Products
9. Intelligent Multidrop Modems
10. Specialty Products
11. Universal Sub-rack Frames
12. SpectraSmart Network Diagnostics

Wireless Communications

Wireless Access Point

Wireless Access Point provides secure mesh network, gateway,


and bridge / repeater capabilities for wireless voice, video and
data applications. It features two-radio configuration with a 2.4
GHz (802.11a/b/g) Wi-Fi radio and a 5.8 GHz (802.11a/b/g)
radio packaged in a Military IP66 outdoor rugged, weatherproof
enclosure. The wireless access point operates on Power-over-
Ethernet and can be used for a variety of secure communication
applications including homeland defense, military, law
enforcement, public safety and industrial / commercial
applications.

Command Control Communication and Computer Intelligence and Surveillance


and Response (C4ISR) Center

The C4ISR is the custodial and security nerve center


where officers in the C4ISR center have the ability to
perform the following operations and functions from the
monitoring and control consoles: perimeter fence
sensors, surveillance camera video and radar targets;
mobile patrol positions; monitoring and control
capability of all security doors of the building; individual
Entry Control Intrusion Detection and Surveillance System

or group release of all electronic doors; monitoring of perimeter and roof detection systems;
local video assessment system; fire, smoke and sprinkler alarm; HVAC equipment monitoring;
intercom/public address and monitoring for the entire site; monitoring of any motion detector
equipment; lighting controls, duress alarms, watch-tour monitoring and annunciation, two-
way radio communications as required.

Emergency Response Stations:

The Emergency Response Stations provide the


immediate response to potential security
incursions. The surveillance system is monitored
by sensor technology supplemented by CCTV
cameras. The ERS is networked to the surveillance
system and other sensor nodes through a
redundant Fiber optic network. The optical
cameras provide immediate assessment of any
potential target in the operational sector. The
Command and Control console provides the operator situational awareness and control of
sensors and cameras in assigned area of operations. Access control is monitored at
entrances, interior doors and vehicle gates for all key facilities
Entry Control Intrusion Detection and Surveillance System

Appendix 1.
Strengths and weaknesses of commercially available sensor technologies
(Klein, 2001; Rhodes, 2005; Klein, et al., 2006).
Entry Control Intrusion Detection and Surveillance System

Appendix 1.
Strengths and weaknesses of commercially available sensor technologies (Klein, 2001;
Rhodes, 2005; Klein, et al., 2006).

Technology Strengths Weaknesses


Inductive Loop • Flexible design to satisfy large • Installation requires pavement cut.
variety of applications.
• Mature, well understood • Decreases pavement life.
technology.
• Large experience base. • Installation and maintenance require lane closure.
• Provides basic traffic parameters • Wire loops subject to stresses of traffic and
(e.g., volume, presence, occupancy, temperature.
speed, headway, and gap).
• Insensitive to inclement weather • Multiple detectors usually required to monitor a
such as rain, fog, and snow. location.
• Provides best accuracy for count • Detection accuracy may decrease when design
data as compared with other requires detection of a large variety of vehicle classes.
commonly used techniques.
• Common standard for obtaining
accurate occupancy measurements.
• High frequency excitation models
provide classification data.
Magnetometer (Two- • Less susceptible than loops to • Installation requires pavement cut.
axis fluxgate stresses of traffic.
magnetometer)
• Insensitive to inclement weather • Decreases pavement life.
such as snow, rain, and fog.
• Some models transmit data over • Models with small detection zones require multiple
wireless RF link. units for full lane detection.
• Installation and maintenance require lane closure.
Entry Control Intrusion Detection and Surveillance System

Magnetic (Induction or • Can be used where loops are not • Installation requires pavement cut or boring under
search coil feasible (e.g., bridge decks). roadway.
magnetometer)
• Some models are installed under • Cannot detect stopped vehicles unless special sensor
roadway without need for pavement layouts and signal processing software are used.
cuts. However, boring under
roadway is required.
• Insensitive to inclement weather
such as snow, rain, and fog.
• Less susceptible than loops to
stresses of traffic.
Microwave Radar • Typically insensitive to inclement • CW Doppler sensors cannot detect stopped vehicles.
weather at the relatively short
ranges encountered in traffic
management applications.
• Direct measurement of speed.
• Multiple lane operation available.
Active Infrared (Laser • Transmits multiple beams for
radar) accurate measurement of vehicle
position, speed, and class.
• Multiple lane operation available. • Operation may be affected by fog when visibility is
less than ≈20 ft (6 m) or blowing snow is present.
• Installation and maintenance, including periodic lens
cleaning, require lane closure.
Passive Infrared • Multi-zone passive sensors • Passive sensor may have reduced sensitivity to
measure speed. vehicles in heavy rain and snow and dense fog.
• Some models not recommended for presence
detection.
Entry Control Intrusion Detection and Surveillance System

Ultrasonic • Multiple lane operation available. • Environmental conditions such as temperature change
and extreme air turbulence can affect performance.
• Capable of over-height vehicle Temperature compensation is built into some models.
detection.
• Large Japanese experience base. • Large pulse repetition periods may degrade occupancy
measurement on freeways with vehicles traveling at
moderate to high speeds.
Acoustic • Passive detection. • Cold temperatures may affect vehicle count accuracy.
• Insensitive to precipitation. • Specific models are not recommended
• Multiple lane operation available in with slow moving vehicles in stop-and- go traffic.
some models.
Video Image Processor • Monitors multiple lanes and • Installation and maintenance, including periodic lens
multiple detection zones/lane. cleaning, require lane closure when camera is mounted
over roadway (lane closure may not be required when
camera is mounted at side of roadway)
• Easy to add and modify detection • Performance affected by inclement weather such as
zones. fog, rain, and snow; vehicle shadows; vehicle projection
into adjacent lanes; occlusion; day-to-night transition;
vehicle/road contrast; and water, salt grime, icicles, and
cobwebs on camera lens.
• Rich array of data available. • Requires 30- to 50-ft (9- to 15-m) camera mounting
height (in a side-mounting configuration) for optimum
presence detection and speed measurement.
• Provides wide-area detection when • Some models susceptible to camera motion caused by
information gathered at one camera strong winds or vibration of camera mounting structure.
location can be linked to another.
• Generally cost-effective when many detection zones
within the field-of-view of the camera or specialized data
are required.
• Reliable nighttime signal actuation requires street
lighting.
Entry Control Intrusion Detection and Surveillance System

Appendix 2.
Technical Data sheets – Speed Detection

You might also like