Perimeter control for prison
-
Upload
hafiza-abas -
Category
Education
-
view
775 -
download
0
description
Transcript of Perimeter control for prison
Video here…..
-To make sure that perimeter of prison is protected
-Restricted areas need to be constantly guarded to prevent any unauthorized access and escape.
Prison has a perimeter that must be protected,ensuring no unauthorized access to the plant
The key to overall security is to implementing several layer
Prison security layer › Outdoor perimeter› Indoor security
Is to Detect and impede an attackPhysical control
› Gates › Door › Fences Perimeter wall Concertine wire
-Installing outdoor perimeter system in pre existing structure:
-triggering alarm signal if crossed• Microwave barrier/ intrusion detection system• Infrared beam• Doopler sensor
CCTV Camera › Wide area surveillance allows cameras to
be used to create a barrier zone › Apply rules to these zone ( what can enter
this area)› If violates rules alarm would be triggered
Technology How its works
magnetomeers Detect vibration disturbance when someone climbs the fence or cut the links
Fiber optic Monitor long and wide barier Basics Disturbance-sensitive cable is installed on existing chainlink/metal fences
Radio barrier wireless technology of intruder detection and transmission of alarm information viatwo-way secure radio channel with a guaranteed delivery of alarm messages to stationaryand portable receiving units
Fence detection system Deploy any combination of fence, buried cable, or digital microwave sensors on a single communications platform
Fence detection system
operator do not have to look at all over the perimeter but only at ne display showing all the necessary information.
• Segments to considered :– Perimeter security: includes
lighting,fencing,electronic detection,equipment for staff and electronic contraband detection
– Staff and inmate communication: involves technology related to intercom,radios,telephone,emergency callback system, pagers and cell phones
– Contraband detection: entail metal detectors, x ray machines and ion scanners.
• Hosmer, P. (2004). Use of laser scanning technology for perimeter protection. Aerospace and Electronic Systems Magazine, IEEE, 19(8), 13-17.
• Moseley, K., Coleman, A., & Sinclair, W. G. (2000). Barriers [security]. In Security Technology, 2000. Proceedings. IEEE 34th Annual 2000 International Carnahan Conference on (pp. 100-106). IEEE.
Sykes, G. M. (2007). The society of captives: A study of a maximum security prison. Princeton University Press.
King, R. D., Morgan, R., Martin, J. P., & Thomas, J. E. (1980). The future of the prison system (p. 34). Farnborough: Gower.
1. http://m.youtube.com/watch?v=PJQu-OFkyV0 2. http://m.youtube.com/watch?v=QdtmSIthmlQ 3. http://m.youtube.com/watch?v=rydhZIBAp4A 4. http://m.youtube.com/watch?v=Ba_RykWPRR8 5. http://m.youtube.com/watch?v=isEfNTQ_daA 6. http://m.youtube.com/watch?v=BHTGODOwIJc