Method and system for advanced electronic border security
09633535 ยท 2017-04-25
Assignee
Inventors
Cpc classification
International classification
G08B1/00
PHYSICS
Abstract
A system (10) for protecting a border (B) comprises a fiber-optic cable (12) extending from one end of a border to the other end thereof. The cable includes a bundle of optical fibers which connect to sensors placed at intervals long the border. Included within the fiber-optic cable is a high voltage conductor by which high voltage AC is introduced into, and passes through, the cable for powering the sensors. The high voltage is stepped down and rectified from AC to DC for this purpose. Various types of sensors (100-700) are arranged in pods (14) located at intervals along the length of the border. A method of border protection is also disclosed.
Claims
1. A system for protecting a border comprising: a fiber-optic cable extending from one end of a border to the other end of the border regardless of the terrain encountered along the length of the border, the cable being installed beneath a surface of the ground substantially throughout the length of the border, and the cable including a bundle of optical fibers extending the length of the cable; sensors installed at locations along the border for detecting an incursion or intrusion of the border, each sensor being connected to optical fibers of the cable; and, the cable further including a high voltage conductor also enclosed within the cable and extending throughout the length of the cable and by which high voltage AC is introduced into, and passes through the entire length of the cable for powering the sensors regardless of the sensor's location along the length of the cable, the provision of the high voltage conductor allowing power to be supplied to the sensors regardless of the sensors' location along the length of the cable and eliminating the need for other sources of power located anywhere along the length of the border; and, wherein the high voltage AC introduced into and passing through the fiber-optic cable is approximately 13,300 volts with the fiber-optic cable supplying all of the power required to power the sensors wherever the sensors are located along the length of the cable, and the fiber-optic cable further communicating outputs from each sensor, wherever located along the length of the cable, to a processing location where a sensor's output is evaluated and a threat assessment made with respect to a detected incursion.
2. The system of claim 1 in which a plurality of sensors are installed at each location, the sensors being comprised of different type sensors for detecting an incursion in different ways.
3. The system of claim 2 in which the different type sensors form suites of sensors arranged in sensor pods which are installed at the locations along the border.
4. The system of claim 3 in which each pod comprises a container placed in the ground and covered over so as not to be readily visible to someone attempting to cross the border.
5. The system of claim 4 in which the pods are connected together by segments of the cable with the cable supplying each pod a power and a communications capability for the sensors associated with that pod, and each pod including means for routing power to the sensors and for interfacing the sensors with the cable.
6. The system of claim 5 in which the means for power routing includes a step-down transformer and rectifier for converting the high voltage transmitted through the cable to a voltage required for powering each sensor associated with the pod.
7. The system of claim 2 in which the sensors can either be overtly or covertly installed at a location where they are installed.
8. The system of claim 3 in which the sensors include: optical and imagery sensors; audio sensors; vibration/seismic ground sensors; weight/pressure sensors; NBC sensors; radar; and motion detection cables.
9. The system of claim 1 including at least one control center at the processing location to which sensor information transmitted through the cable is routed, the control center having means for displaying and evaluating the information received in order to make a threat assessment for a detected incursion.
10. The system of claim 9 further including additional means for routing information to the control center.
11. The system of claim 10 in which said additional means for routing information includes one or more of a point-to-point; point-to-multipoint; and mesh topology communications system.
12. The system of claim 9 further including a mobile control center and means for transmitting information routed through the cable to the mobile control center.
13. A method for protecting a border comprising: installing a fiber-optic cable extending from one end of a border to the other end of the border; installing the cable beneath a surface of the ground substantially throughout the length of the border and regardless of the terrain through which the cable is routed, the cable including a bundle of optical fibers extending the length of the cable; installing sensors at selected locations along the length of the border to detect an incursion or intrusion of the border and connecting each sensor to optical fibers of the cable; installing a high voltage conductor throughout the length of the cable for conduction approximately 13,300 volts AC from one end of the cable to the other end of the cable to conduct high voltage along the entire length of the border through the cable for powering the sensors regardless of a sensor's location along the length of the border, the provision of the high voltage conductor allowing power to be supplied throughout the length of the cable without the need for other sources of power located anywhere along the length of the border; and, communicating outputs from each sensor, wherever located along the length of the cable, to a processing location where the sensor output is evaluated and a threat assessment made with respect to the detected incursion.
14. The method of claim 13 in which a plurality of sensors are installed at each location, the sensors being comprised of different type sensors for detecting an incursion in different ways.
15. The method of claim 14 in which the sensors are either overtly or covertly installed at the location.
16. The method of claim 14 in which the different type sensors form suites of sensors arranged in sensor pods installed at the locations along the border, each pod comprising a container placed in the ground and covered over so as not to be readily visible to someone attempting to cross the border.
17. The method of claim 16 further including connecting the pods together by segments of the cable, the cable supplying each pod a power and a communications capability for the sensors associated with that pod, and each pod including means for routing power to the sensors and for interfacing the sensors with the cable.
18. The method of claim 17 in which the power routing means includes a step-down transformer and a rectifier for converting the high voltage transmitted through the cable to a voltage required for powering each sensor associated with the pod.
19. The method of claim 13 in which the sensors include: optical and imagery sensors; audio sensors; vibration/seismic ground sensors; weight/pressure sensors; NBC sensors; radar; and motion detection cables.
20. The method of claim 13 further including routing sensor information transmitted through the cable to a control center at the processing location having means for displaying and evaluating the information received in order to make a threat assessment for a detected incursion.
21. The method of claim 20 further including additionally routing information to the control center using one or more of a point-to-point; point-to-multipoint; and mesh topology communications system.
22. The method of claim 20 further including transmitting information routed through the cable to a mobile control center.
Description
BRIEF DESCRIPTION OF THE DRAWING
(1) In the drawings:
(2)
(3)
(4)
(5)
(6)
(7) Corresponding reference characters indicate corresponding parts or features throughout the several views of the drawings.
DETAILED DESCRIPTION OF INVENTION
(8) The following detailed description illustrates the invention by way of example and not by way of limitation. This description clearly enables one skilled in the art to make and use the invention, and describes several embodiments, adaptations, variations, alternatives and uses of the invention, including what is presently believed to be the best mode of carrying out the invention. Additionally, it is to be understood that the invention is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced or carried out in various ways. Also, it will be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting.
(9) Referring to the drawings, a border B extends between two countries C1 and C2. Although not shown in the drawings, border B typically extends over a variety of terrains and, in many instances, through remote, uninhabited areas. Heretofore, border protection systems have employed ground sensors including ground radar and the like to detect breaches of the border. The sensors were installed at intervals along the border and required locally available power for operation. As such, these systems required significant effort to remain in operation.
(10) In accordance with the present invention, a border security system 10 includes a fiber-optic, high voltage (HV) cable indicated generally 12. Cable 12 is installed and extends along the entire length of border B. Importantly, the cable extends underground substantially the entire length of the border. At numerous sites along the border, sensors of various types, as described hereafter, are deployed. The sensors are used either individually, or they are incorporated into suites of sensors. Regardless, the sensors and their associated power and sensing lines are routed through a pod 14 which is installed at these locations. The various combination of sensors emplaced at a particular location are engineered to the particular terrain at the location as well as other variables unique to that particular stretch of border B such as the remoteness of the location, particular geographic features, the types of incursion activity experienced in the locale, etc. As shown in
(11) As particularly shown in
(12) A section of cable 12 extends between each pod 14 as shown in
(13) As shown in
(14) To help protect the integrity of cable 12, it is deployed using self-healing rings (SHR) that require no power or access to the fiber strands. Accordingly, at the ends of the border, a dense wave division multiplexing solution is implemented which utilizes a high power laser (not shown) to repeat the signals to each end. Also, if necessary, the information provided by the sensors is encrypted or encoded in a secure format prior to transmission
(15) Referring to
(16) If the deployment is covert, then the sensor is housed in some type of concealment that shrouds its visibility. Various types of concealments are known in the art. See, for example, U.S. Pat. No. 8,314,839 also to the same inventor. An advantage of using concealed sensors is that it makes detection of intruders and anything they are bringing across the border with them easier (because they are not aware of its presence) and facilitate their apprehension. Those skilled in the art will appreciate that for covert placements, both the sensors and their concealments can be custom designed.
(17) A first type of sensor used in system 10 includes optical and imagery sensors 100. Typically one or more of these type sensors are installed at each sensor location along the length of border B. The imaging sensors provide an all-weather means of detection of intruders or other objects entering their field-of-view (FOV). Many sensors further have a pan, tilt and zoom (PTZ) capability that enables them to track (either by manual control or automatically) any object surreptitiously crossing border B.
(18) Cameras may be black-and-white or color cameras and are particularly useful in providing real time imagery or video used at a command site to view intruder(s). This lets security personnel perform a threat assessment as to whether or not the person(s) is friend or foe so to determine whether or not to send security forces to apprehend the individual(s). Other types of sensors employed include those using image intensification (e.g., infrared or thermal sensors). These extend viewing capabilities under less than advantageous lighting conditions. Furthermore, these other imagers can also be used in a fixed or variable mode of operation.
(19) Importantly, a suite of imagery/optical sensors as employed in system 10 will all combine into one cohesive system. That is, when the presence of an intruder is sensed by any of the sensors, annunciation of the detection now allows security personnel to acquire and utilize imagery from the optical sensors to view an intruder and assess the threat he represents.
(20) Next, the sensor suite also includes audio sensors 200. Many of these sensors include a filter capability to eliminate background noises so they can better detect pertinent sounds such as voices, vehicle sounds, etc., within the area where they are emplaced. Sounds picked up by the audio sensors are then analyzed to provide information as to movements, conversations and other noises which are evidentiary of intruders. The information they provide is also useful in aiding system operators to make threat assessments.
(21) Vibration/seismic ground sensors 300 employed in system 10 incorporate accelerometers and other types of detection methods for sensing movements. It is important for these sensors to detect the minutest variations in the seismological signature of the ground at the location where they are installed. As such, the sensors are able to accurately detect footsteps, the movement of equipment, and other stimuli along a border area. Once positive detection of an intrusion is made, the outputs from these sensors are integrated into the detection scheme at that locale and reported back to the system operators. The operators again use these information in make a threat assessment and determining how to apprehend any intruders.
(22) Weight/pressure sensors 400 are employed to detect the weight of persons, animals or vehicles, equipment or packages moving over border B within a monitored area. These sensors, for example, use underground switches either in the form of an individual pressure switch or an area switch via an underground mat. Once a sensor is activated, it communicates back to a system 10 command center.
(23) Nuclear, biological, and chemical sensors 500, typically referred to as NBC sensors, include discrete or multiple detection sensors which detect through radiation or the air; the presence of nuclear materials, toxic chemicals typically utilized in weapons of mass destruction, and biological agents intended to harm or kill other human beings.
(24) Two basic types of radar 600 are employed within system 10. The first type of radar is a ground based, threat detection radar which detects the movement of objects along the surface of the ground within the area where the radar is located along border B. The detectable object can be human or animal, metallic or other objects. Once an object is detected by ground radar it is located and tracked within the area using GPS.
(25) The second type of radar is an airborne radar detection platform. These platforms are emplaced in sparsely populated, barren, and remote areas along the border. In operation they detect objects (airplanes) flying over the border. In many instances, the altitude and flight path of these objects make them undetectable by long range radar equipment.
(26) Motion detection along border B can further be achieved using various models of coaxial and fiber-optic cable which detect above ground movement of people and equipment. Motion detection cables 700 of these types are usually buried underground and extend longitudinally along a strip of the border. Once detection occurs, specific GPS locations are coordinated and passed along the fiber-optic communications channel provided by system 10. If available, optical imagers, as described above, can be activated to perform a remote threat assessment as to friend or foe, or security personnel can be dispatched to the area for a similar purpose.
(27) It is important to understand that at defined sensor locations, the sensors or sensor pods 14 are placed so that their field of or range of detection extends longitudinally along a strip of border B that is to be secured. Proper engineering and design of the required sensors to protect against all perceived threats will produce an end result of a secure area. The types and numbers of particular sensors used are based, to a large extent, on the topology and topography of each specific site where the sensors and sensor pods are located. In this regard, it is crucial to the reliable and continuous detection of intruders at any point along the border that the makeup of sensors, and the sensor pods and packages containing a suite of sensors be changeable from one location to another, as necessity dictates. Use of fiber-optic/HV cable 12 provides efficient access to bandwidth sufficient to interconnect all the sensors deployed along border B as well as the electrical power needed at each site along the border for the sensors to operate. This results in a cost effective, efficient solution to the challenge of implementing a comprehensive border security system.
(28) Referring again to
(29) In addition, to augment the monitoring resources provided by fiber-optic cable 12, certain border areas or regions may be further served by an extension of the communications path; this being accomplished using RF microwave communications equipment. The variations of RF network topology which can be utilized are configured using a set of back-to-back microwave radios arranged in a point-to-point, point-to-multipoint and mesh mode of operations. That is, it comprises a path which originates at point a Y and terminates only at a point Z.
(30) Further in this regard is a mode of RF operation referred to as point-to-multipoint. Typically this arrangement involves a site having an omni-directional RF antenna capable of simultaneously transmitting RF microwave traffic to multiple remote sites. This configuration is optimal where multiple remote pods 14 are located such that they are within a line of sight path from a single host site.
(31) In addition, system 10 can also be augmented using a mesh RF topology. In mesh topology, each site has the ability to operate as a repeater. This allows sites which do not have line of sight with a host site, but which do have line of sight with an intermediate site that does, to have RF signals transmitted from the host site repeated to them through the intermediate site.
(32) Located at the control centers 30, or any mobile centers, are situational awareness displays for providing real-time information from the sensors and relevant situational aware data. These displays typically include aerial displays which are GPS coordinated with the location of each sensor pod 14 along the length of border B. Such displays, for example, are arranged as big screen wall displays for the overall system, as well as discrete computer graphical displays for each segment of the sensor network. The displays provide both access to alarm data and a video display based on inputs from the optical sensors deployed over the length of border B. When an incursion or intrusion event occurs, and a sensor or sensors are activated, the displays provide an annunciation to the system 10's operators in both sound and video. In many instances, the optical sensors integrated into system 10 allow operators to remotely assess an intruder and make a determination as to whether they are friend or foe. Such a decision can then result in security personnel being dispatched to the site of the incursion to intercept an intruder(s) if they are determined to be hostile.
(33) Finally, each control center has the capability to store or archive received information from the sensors for future use.
(34) In view of the above, it will be seen that the several objects and advantages of the present disclosure have been achieved and other advantageous results have been obtained.