Perimeter control for prison

Preview:

DESCRIPTION

Physical Security Subject

Citation preview

Video here…..

-To make sure that perimeter of prison is protected

-Restricted areas need to be constantly guarded to prevent any unauthorized access and escape.

Prison has a perimeter that must be protected,ensuring no unauthorized access to the plant

The key to overall security is to implementing several layer

Prison security layer › Outdoor perimeter› Indoor security

Is to Detect and impede an attackPhysical control

› Gates › Door › Fences Perimeter wall Concertine wire

-Installing outdoor perimeter system in pre existing structure:

-triggering alarm signal if crossed• Microwave barrier/ intrusion detection system• Infrared beam• Doopler sensor

CCTV Camera › Wide area surveillance allows cameras to

be used to create a barrier zone › Apply rules to these zone ( what can enter

this area)› If violates rules alarm would be triggered

Technology How its works

magnetomeers Detect vibration disturbance when someone climbs the fence or cut the links

Fiber optic Monitor long and wide barier Basics Disturbance-sensitive cable is installed on existing chainlink/metal fences

Radio barrier wireless technology of intruder detection and transmission of alarm information viatwo-way secure radio channel with a guaranteed delivery of alarm messages to stationaryand portable receiving units

Fence detection system Deploy any combination of fence, buried cable, or digital microwave sensors on a single communications platform

Fence detection system

operator do not have to look at all over the perimeter but only at ne display showing all the necessary information.

• Segments to considered :– Perimeter security: includes

lighting,fencing,electronic detection,equipment for staff and electronic contraband detection

– Staff and inmate communication: involves technology related to intercom,radios,telephone,emergency callback system, pagers and cell phones

– Contraband detection: entail metal detectors, x ray machines and ion scanners.

• Hosmer, P. (2004). Use of laser scanning technology for perimeter protection. Aerospace and Electronic Systems Magazine, IEEE, 19(8), 13-17.

• Moseley, K., Coleman, A., & Sinclair, W. G. (2000). Barriers [security]. In Security Technology, 2000. Proceedings. IEEE 34th Annual 2000 International Carnahan Conference on (pp. 100-106). IEEE.

Sykes, G. M. (2007). The society of captives: A study of a maximum security prison. Princeton University Press.

King, R. D., Morgan, R., Martin, J. P., & Thomas, J. E. (1980). The future of the prison system (p. 34). Farnborough: Gower.

1. http://m.youtube.com/watch?v=PJQu-OFkyV0 2. http://m.youtube.com/watch?v=QdtmSIthmlQ 3. http://m.youtube.com/watch?v=rydhZIBAp4A 4. http://m.youtube.com/watch?v=Ba_RykWPRR8 5. http://m.youtube.com/watch?v=isEfNTQ_daA 6. http://m.youtube.com/watch?v=BHTGODOwIJc

Recommended