WO2006093527A2 - Modular autonomous perimeter security and non-lethal defense system - Google Patents

Modular autonomous perimeter security and non-lethal defense system Download PDF

Info

Publication number
WO2006093527A2
WO2006093527A2 PCT/US2005/026905 US2005026905W WO2006093527A2 WO 2006093527 A2 WO2006093527 A2 WO 2006093527A2 US 2005026905 W US2005026905 W US 2005026905W WO 2006093527 A2 WO2006093527 A2 WO 2006093527A2
Authority
WO
WIPO (PCT)
Prior art keywords
intruder
facility
warning
delivering
deterrent
Prior art date
Application number
PCT/US2005/026905
Other languages
French (fr)
Other versions
WO2006093527A3 (en
Inventor
Stephen B. Squires
Original Assignee
U.S. Global Nanospace, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by U.S. Global Nanospace, Inc. filed Critical U.S. Global Nanospace, Inc.
Publication of WO2006093527A2 publication Critical patent/WO2006093527A2/en
Publication of WO2006093527A3 publication Critical patent/WO2006093527A3/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras

Definitions

  • the present invention relates to methods and systems for defending infrastructure facilities such as pipelines, storage facilities, utilities, etc.
  • the present invention provides a method of providing autonomous defense for a facility, the facility having an adjacent restricted access area.
  • An intruder is detected in the restricted access area.
  • a warning is delivered to the intruder in the restricted access area. After delivering the warning, it is determined if the intruder poses a threat to the facility. If so, then a deterrent is delivered to the intruder.
  • detecting an intruder in the restricted access area further comprises utilizing radar to detect the intruder.
  • delivering a warning to the intruder in the restricted access area further comprises delivering an audible warning.
  • determining if the intruder poses a threat to the facility further comprising determining if the intruder moves closer to the facility.
  • delivering a deterrent to the intruder further comprises delivering a disabling sound.
  • the present invention also provides a system for providing autonomous defense of the facility, the facility having an adjacent restricted access area.
  • Detection devices are distributed so as to monitor the restricted access area for intruder.
  • Warning devices are capable of delivering a focused warning to a specified location in the restricted access area.
  • the warning devices are distributed over the restricted access area.
  • a deterrent device is capable of delivering a focused deterrent to a specified location in the restricted access area.
  • a processor communicates with the detection devices, the warning and the deterrent device.
  • the processor receives inputs from the detection devices and determines the threat of an intruder in the restricted access area.
  • the processor provides an output to command the warning device closest to the intruder to deliver the focused warning.
  • the processor determines if the intruder moves closer to the facility and if so then provides an output to command the deterrent device closest to the intruder to deliver the deterrent to the intruder.
  • the detection devices comprise radar units.
  • the warning devices comprise sound emitters.
  • the deterrent devices comprise sound emitters.
  • the detection devices, warning devices and deterrent devices communicate over a distributor wireless network.
  • FIG. 1 is a drawing showing a pipeline equipped with the system of the present invention.
  • Fig. 2 is a block diagram showing components of the system.
  • Fig. 3 is a radar image showing "allowed” and “unallowed” areas.
  • Fig. 4 is a block diagram showing components of a digital gateway/recorder.
  • Fig. 5 is a block diagram of an acoustical, or sonic, device.
  • Fig. 6 is a block diagram of a weapons unit.
  • Fig. 7 is a block diagram showing the mesh network.
  • the present invention can be used to protect various types of infrastructure facilities, such as pipelines, refineries, above ground storage facilities, electrical utilities, airports, ships, ports, offshore facilities such as oil platforms, etc. and is particularly well suited to remote areas.
  • the invention can be used along an intangible facility, such as a border between two countries.
  • the present invention provides a system and method that provides large area perimeter security and deterrents to intruders.
  • the present invention utilizes detection devices to detect and track objects and intruders.
  • An intruder can be an individual, a group of individuals, a vehicle or a number of vehicles.
  • An object or target is a potential intruder that is tracked to determine if it intrudes into a restricted access area.
  • warnings are sent to security personnel who guard the pipeline. The security personnel are dispatched to the site of the intrusion.
  • the present invention provides an automated detection and defense system for various types of facilities.
  • the present invention operates automatically without the intervention of humans.
  • the present invention serves not only to deter intruders, but also serves to buy time until security personnel can arrive on the scene.
  • One option is to allow a man in the loop so as to remove some autonomy, such as in delivering disabling or lethal deterrents.
  • the pipeline has a restricted access area 25, which is typically a zone or zones that extend out from the pipeline for some distance.
  • the pipeline 11 is equipped with a number of devices 13. There are detection devices, which include radar 15 and cameras 17, and also warning and deterrent devices, which can include sonic devices 19 for providing warnings and sound barriers and weapons 20.
  • Radar units 15 are distributed over the length of the pipeline 11.
  • the radar units provide wide area surveillance and are capable of detecting and tracking personnel and vehicles at extended ranges.
  • the radar units 15 provide 360 degree coverage and provide for terrain following in that the radar can be depressed or raised from the horizontal.
  • the range resolution is about half a meter.
  • the radar units 15 can be programmed to provide "allowed" areas and "unallowed", or restricted, access areas. This is shown in Fig. 2, which shows an area 21 swept by a radar unit 15. Most of the area is considered an allowed area 23, with an inner area, of irregular shape, being considered a restricted access area 25.
  • an object such as a person, or vehicle
  • the system actively surveils that object and tracks it.
  • an object is in the allowed area 23, the system does not consider such an object to be a threat.
  • the restricted access area 25 the system considers the object to be a threat.
  • Fig. 1 shows another example of an allowed area 23 and a restricted access area 25 (which is divided into zones), as applied to the pipeline 11.
  • the radar units 15 have a range of about 12 km.
  • the radar units are spaced apart from one another, along the length of the pipeline so as to provide a surveillance of satisfactory size about the pipeline.
  • the range of a radar unit may be diminished, wherein the radar units are spaced more closely together.
  • the radar devices are commercially available from Sensor Technologies and Systems, Inc. of Scottsdale, Arizona.
  • the radar units can be of two types. There is a main radar unit 15. The main radar unit is augmented by a series of small or "blind spot" radar units 16. A blind spot radar unit reports to a main radar unit.
  • Each device 13 has a control module 31, which will be described in more detail below with reference to Fig. 4.
  • Each radar unit has a radar control module 31.
  • the radar control module for the main radar units 15 are the cell controller for a particular cell. Each cell is a system in and of itself, and all decisions pertaining to a response within a cell can be made within that cell. Cells are comprised of a group of nodes. Each device 13 constitutes a node. The cells are a virtual concept, and not a physical representation, as a single device 13 can be assigned to two cells. The use of cells makes the system more autonomous and robust.
  • the radar control module collects target information from the respective radar unit. If the target information is from a blind spot radar 16, it is mapped into the coordinate system of the main radar unit 15.
  • the radar control module assesses the targets for speed and direction, based upon successive sweeps of the radar. It also makes the target information available to the cell controller module.
  • the radar control module monitors and reports on the health of its attached radar unit.
  • the radar control module requires its GPS (global positioning system) coordinates, as well as the GPS coordinates of its associated blind spot radars 16.
  • the other type of detection devices are cameras 17.
  • the cameras are long range infrared cameras.
  • the cameras are packaged in compact, ruggedized and sealed housings.
  • the housing is purged with dry nitrogen in order to prevent condensation at lower temperatures.
  • the optics of the camera are treated with a resistant carbon coating to protect against damage from salt water and sand.
  • Various focal length motorized lenses can be used.
  • the camera uses 25, 80 and 320 mm focal length lenses.
  • the lenses can be switched by command for detection and recognition at distances ranging from 5 to 25 km.
  • the camera can be remotely operated and can take still or video images.
  • the video images can be displayed in analog or digital RS- 422 format.
  • the camera comprises an InSb focal plane array sensor, 14-bit digital electronics and motorized optics.
  • the range of the cameras is considered to be about 12 km in clear weather and the cameras are spaced accordingly apart along the length of the pipeline.
  • the cameras function in day or night, light or dark and in all weather conditions. In some geographical locations, a full 12 km camera range may not be possible, wherein the cameras are spaced closer together so as to provide complete peripherial coverage of the pipeline.
  • the camera devices are commercially available from CEDIP Infrared Systems, of Croissy-Beaucios, France.
  • Each camera 17 has a control module 31 which monitors the status of the camera and reports to the cell controller module.
  • the control module which knows its GPS coordinates, translates the target coordinates into local coordinates to allow the camera to be aimed at the target.
  • the control module records and streams video from the camera.
  • the sonic devices 19 are long range audible devices (LRAD) and are capable of delivering high intensity sounds at some distance away from the structure.
  • the sonic devices 19 have sound emitters that can be moved remotely so as to point to a particular location.
  • the sound emitter(s) is a flat panel, multi-transducer, phase coherent emitter with 146dB of sustained sound delivery.
  • the sound emitter projects sound at a frequency of 2.1-3.1 KHz.
  • the volume ranges from 120 to 150 dB at hundreds of yards away.
  • the sonic devices 19 can also produce verbal warning signals.
  • the system is designed to provide a verbal warning signal of about 100 dB at a distance of 500 yards from the pipeline.
  • a disabling sound of about 120 dB is provided.
  • the sound can be from two distinct sources, one of which is hypersonic.
  • the two sounds are sent in beams, which beams intersect at a desired location (the intruder's location) and create the sound as if it were generated at the intersection point rather than from the sources. Intersecting sound beams allows an increase of intensity at the target location to disabling and even lethal levels.
  • the sonic devices 19 are distributed so as to have two or three units per kilometer.
  • the sonic devices are available commercially from American Technology Corporation of San Diego, California.
  • the weapons 20 can be non-lethal, lethal, or a combination of the two.
  • Non-lethal weapons include launchers for tear gas, pepper spray and stink bomb sticks.
  • a grenade launcher or mortar could be used.
  • Other types of shells could be used, such as those containing rock salt and dyes.
  • the weapons could also include a machine gun that fires rubber bullets.
  • Lethal weapons include guns, such as machines guns and grenade launchers with grenades or air burst munitions.
  • the weapons are located near the pipeline and can be aimed at the intended target.
  • a launcher can have horizontal and azimuth adjustments.
  • the weapons are located in a sealed container to provide protection against the elements, thereby increasing reliability. The seal or container is broken upon firing.
  • Payloads can include: counter personnel, markers, taggants, incapacitants, malodorants, OC/RCA, Stingball Grenade, Fuzed Blunt Injury, counter materiel, Markers, taggants and Anti-traction.
  • LIPC Laser induced plasma channel
  • PEP Pulsed Energy Projectile
  • PEP Pulsed Energy Projectile
  • PEP Pulsed Energy Projectile
  • PEP Pulsed Energy Projectile
  • the effect is like a stun grenade, but unlike a grenade the pep travels at nearly the speed of light and can take out a target with pinpoint accuracy.
  • Vortex Launcher a supersonic vortex of air hits its target at about half the speed of sound with enough force to knock them off balance.
  • HPM Vehicle Stopper High power microwaves are focused on a fleeing vehicle so as to interrupt or disrupt vehicle engine operation or the functioning of electronics.
  • Tetanizing Beam Weapon as described in U.S. Patent # 5,675,103.
  • Tetanization is the stimulation of muscle fibers at a frequency which merges their individual contractions into a single sustained contraction.
  • This device uses two beams of UV radiation to ionize paths in the air along which electrical current is conducted to and from the target. The current within these beams is a close replication of the neuro-electric impulses that control skeletal muscles. It is imperceptible to the target person because it differs from their own neural impulses only in that its repetition rate is sufficiently rapid to tentanize muscle.
  • Non-lethal deliverables include riot control agents, malodorants, and calmatives.
  • Riot control agents include chemicals that irritate mucous membranes and cause lacrimation, irritation, or inflammation. RCAs produce rapid sensory irritation or disabling physical effects that disappear within a short time following termination of exposure. Most commonly known are oleoresin capsicum (OC), the active agent in hot peppers; chloroacetophenone (CN); and ochlorobenzylidene malononitrile (CS), or tear gas.
  • OC oleoresin capsicum
  • CN chloroacetophenone
  • CS ochlorobenzylidene malononitrile
  • Calmatives represent a class of chemical substances: the physiological effects of all calmatives that have been examined occur as a result of depression of the central nervous system, accompanied by mood alteration and respiratory depression.
  • the generally desired ratio of exposure between an effective dose and death is on the order of 103 to 104. (By comparison, the margin of safety for exposure to RCAs such as the lacrimator CS is about 2,500 to 30,000 dose units.)
  • Directed energy may be divided into three categories (1) low-energy lasers and incandescent devices; (2) high- energy lasers; and (3) high-power millirneterwave and microwave devices.
  • the category of low-energy lasers and incandescent devices includes laser dazzlers and flash grenades that use intense visible light to temporarily blind or disorient a person.
  • PEP pulsed-energy projectile
  • DF pulsed deuterium-fluoride
  • High-Power Microwave and Millimeter- Wave Technology can be grouped into two subcategories: (1) those designed to disrupt electronic systems, such as communications and computer networks; and (2) those designed to produce a physiological effect on an individual.
  • Still another sensor can be a sound sensor 39 which has a microphone input. This allows the monitoring and recording of sound at a remote sight.
  • Each device 13 has the option of having a video sensor for confirmation purposes.
  • the sonic device 19 can have a camera which provides images to provide confirmation if the intruder is moving away from the facility.
  • the camera can be used for pinpoint aiming of the particular device.
  • each device 13 radar, camera, sonic is able to communicate wirelessly with the other devices along the pipeline. Each device is capable of carrying out its function and communicating with the other devices.
  • Each device 13 has a digital gateway/recorder 31 (DGR) which serves as a control module.
  • the DGR 31 acts as a network interface unit, or gateway, and can also log data as well as record video.
  • each DGR 31 has a video input 42 to take video from any camera 17 as well as any confirmation camera on a device 13.
  • the DGR also has an audio input 43 for the microphone. There is also an audio output 45 for delivering signals to the sonic device 19.
  • the DGR is provided with a microprocessor 51, a memory 53 in the form of SDRAM, flash memory and SRAM, as well as disk drive.
  • a TCP/IP network interface 55 is provided.
  • a GPS unit 57 is provided to determine the positioning coordinates of the DGR unit.
  • a video recording module 59 is provided which records video in the desired format.
  • An audio recording module 61 is also provided.
  • External inputs 63 can also be provided. An example of an external inputs is a door sensor to determine if the building housing the device has been breached.
  • Fig. 5 shows a typical sonic device 19.
  • the sonic device also has a DGR 31, as well as a confirmation camera 69.
  • the DGR functions as a control module for the sonic device.
  • the control module 31 monitors and reports on the health of the attached sonic emitter, using the sonic emitter's onboard diagnostics, as well as microphone input.
  • the control module also translates the radar coordinates to the local coordinates of the sonic device for positioning and manages any feedback loops for positioning.
  • the appropriate audio messages are streamed and selected based on the request of the cell controller module.
  • the sonic device control module initiates built in tones, and records the confirmation video.
  • Fig. 6 shows a typical weapon 20 such as a grenade launcher 71.
  • the grenade launcher has a positioning motor 73, a fire control system 75, and a DGR 31.
  • the control module for the weapon is a DGR which monitors and reports on the status of the platform and the weapon using built in diagnostics as well as a microphone.
  • the coordinates of the radar are translated into local coordinates for rough platform positioning.
  • the control module also manages any feedback loops for platform positioning.
  • the control module begins the targeting of the weapon by the fire control system 75.
  • the control module also triggers the weapon on command from the cell controller module.
  • the control module programs detonation distances of the grenades and selects firing sequences based on the amount of ammunition.
  • the amount of ammunition is determined by belt load data.
  • the control module also records and streams confirmation video from a confirmation camera.
  • the cell controller module is the overall decision maker for a cell. It is present in all the DGR' s but is only activated in the DGR' s attached to the radar units 15.
  • the cell controller module monitors and reports on the health on all nodes assigned to the cell and monitors and prioritizes the targets based on the information from the radar units 15.
  • the program follows the programmed rules of engagement and commands the responding sonic devices 19 and weapons 20 to take the appropriate actions.
  • the cell controller processes resource requests from surrounding cells based on their target information by comparing the surrounding cell target information with its own target information.
  • the cell controller assigns its own resources, which are the devices, to other cells as required and controls the flow of video data over the network based on traffic.
  • the cell controller requests manual confirmation (for man in loop systems) and processes the response and logs all operational nonvideo data.
  • the devices 13 communicate with each other over a mesh wireless radio frequency (rf) network (see Figs. 3 and 7).
  • the wireless network consists of a transmitter and receiver 33 at each node. Each node can have only one device 13, or it may have two or more devices (such as a camera and a sonic device).
  • the transmitter and receiver 33 are long range, fully integrated communication and control.
  • the communication system uses frequency hopping spread spectrum technology to ensure secure and reliable communications. Data security is further enhanced through proprietary information packets, data compression and fast changing dynamic key encryption of the information that is communicated.
  • the transmitter has a range of between 40 to 56 km. It has line of sight distance using omnidirectional antennas.
  • the output power is one watt maximum with 10 programmable steps ranging from 100 mw to 1 watt.
  • Modulation is spread spectrum, GFSK and frequency hopping is utilized.
  • the occupied bandwidth is 230
  • the receiver has a sensitivity of - 110 dBm @ 10 "4 raw BER; and - 108 dBm @ 10- 6 raw BER.
  • the selectivity is 40 dB @ fc +/-230 KHz; 60 dB @ fc +/- 460 KHz.
  • the system gain is 135 dB.
  • the RF data transmission has a 32 bit CRC error correction.
  • the transmission scheme utilizes substitution dynamic key for data encryption.
  • the RF data rate is 144 kbps-188 kbps.
  • the interface is *10 base-T (UTP), with one straight, one cross-pinned (only one connector can be used at a time).
  • the data throughput is 108 Kbps maximum in point-to-point mode throughput measured assuming 75% frequency availability.
  • the antenna is a standard thread SMA female.
  • Each device 13 has a unitized redundant power source 35 (see Fig. 3).
  • the power source can be a battery with a solar power supply and recharger.
  • a power source 35 can power one or more devices 13, the associated DGR
  • each device 13 can operate independently of the other devices in a stand alone configuration. Therefore, if one device becomes inoperable, then the whole system is not brought down. In operation, the radar units 15 scan for objects 41.
  • DGR' s for the radar units has software to detect movement in their sensing areas or fields of view.
  • the object 41 When an object is detected, the object 41 is tracked. As the object 41 comes closer and closer to the pipeline, this movement is tracked by the radar. When the intruder is close enough it is tracked by the cameras 17.
  • the radar and cameras determine the location and range of the object 41 from the pipeline.
  • the system is programmed to deliver a response to the object based on distance, type of activity and so on. By tracking the object, particularly after delivery of warnings, the intent of the object can be verified, and a more robust response can be delivered.
  • the cell controller for that unit determines the closest sonic device or devices 19 to the intruder and signals those sonic devices 19.
  • the cell controller unit knows the location of each sonic device as well as the network (ip) address of each sonic device. The signal tells the sonic device
  • the signal also provides the location of the intruder so that the sonic device can point toward the intruder.
  • one or more sonic devices 19 point toward the intruder.
  • the camera on each sonic device provides accurate pointing.
  • An audible warning signal is provided to the intruder.
  • the warning signal is loud, about 100 dB, and warns the intruder to stay away, back up, etc.
  • the cameras and radar units 17, 15 monitor the intruder to see if the intruder falls back away from the pipeline or continues on an intersecting path. If the intruder retreats and moves away from the pipeline, the cameras and radar units instruct the sonic device to cease the audible warning signal. The cameras and radar units continue to track the intruder until it moves out ofrange.
  • the cell controller signals for a deterrent.
  • a deterrent is that the sonic device 19 produces a disabling sound.
  • the sound generator produces a disabling sound (120 dB or greater) and projects it in the direction of the intruder.
  • the sound is strong enough so as to cause human beings extreme discomfort as the sound resonates inside of the skull of a human being. Ear plugs or other ear protection is inadequate to protect a human from the sound as the sound penetrates the skull independently of the ear canal.
  • the cell controller sends a signal to security personnel who can investigate the intrusion. The signal to security personnel can occur before the audible warning signal is sent.
  • objects 41 are identified when movement is detected within the scanning range of the radar 15, 16.
  • Object threats are quantified by the object distance from the facility, or more specifically from the barrier 12, or edge, of the facility. The closer an object is to the barrier 12, the higher the threat and the more forceful the response.
  • the system is configurable for both the number of threat levels and their distances from the barrier.
  • the objects are prioritized for response based upon their projected time to reach the barrier. This determination is computed using the object's perpendicular approach speed to the barrier. This applies to objects on the same threat level. Once a object has crossed into a higher threat or response zone, it will be designated the highest priority, with the remaining objects being prioritized based upon their approach speed, but at lower levels of priority than the closest object.
  • Prioritization determines the response resource allocation.
  • Objects 41 are allocated resources (for example sonic device messaging, weapons fire) based upon their threat priority. Resource allocation cycles through the objects in their prioritized order until the objects have been neutralized or the resources have been exhausted.
  • the rules of engagement are applied to objects that have intruded into the restricted access areas so as to provide a warning or deterrent to the object, to determine the object's response, and then if the object continues as a threat to increase the warning or deterrent.
  • the rules are configurable on a per cell basis. Threat levels are calculated based upon an object's perpendicular distance from the barrier.
  • the rules allow for a configurable number of distance bands or zones from the barrier, and allow for each band's distance to be configurable.
  • the response by the system for each level is configurable.
  • the pipeline 11 can have the following threat bands or zones: out to 10,000 meters, there is no threat (level 4), from 800 to 1200 meters is an initial threat zone (level 3), from 400 to 800 meters is an increased threat zone(level 2), from 200 to 400 meters is a serious threat zone (level 1) and from 0 to 200 meters out from the barrier is a grave threat zone (level 0).
  • the number of threat thresholds and distances can be varied according to the circumstances.
  • the restricted access area is levels 0-3, or from 0 out to 1200 meters. Beyond 1200 meters, the system merely tracks objects, monitoring movement to determine if the objects intrude into the restricted access area.
  • the response that is assigned to each level can also be varied. For example, if an intruder enters a particular zone, then the following responses are provided: track target and report (level 4) apply less hostile audible warnings announcing restricted area (level 3) a pply hostile audible warnings (level 2) apply disabling tone (level 1) apply marking munitions (level 2) apply disorienting munitions (level 1) apply disabling munitions (level 1) apply lethal tone (level 0) apply lethal munitions (level 0).
  • the object 41 if the object 41 enters the level 4 zone, then the object is identified by the radar 15, 16 and is reported and logged. If the object intrudes into the level 3 zone, the closest sonic device 19 is positioned to aim at the intruder 41. Initial, non-hostile audible messages are directed at the target by the closest sonic device 19. If the intruder continues to approach the barrier and enters the level 2 zone, the sonic device 19 cycles through more hostile messages. If the intruder continues to advance and enters the level 1 zone, then confirmation of a debilitating, disorienting or lethal response is requested. When the cell controller authorizes and provides confirmation, then the sonic device emits the debilitating and disorienting tone.
  • the closest weapon 20 fires flash bang cartridges and marking cartridges in an effort to deter the target or intruder from further advance. If the intruder continues to advance and enters the level 0 zone, then the sonic device 19 or devices will emit its deadly tone and the weapon 20 will fire deadly ordinance to provide a lethal response.
  • the cell controller prioritizes the objects by their predicted arrival at the barrier, based on their speed and heading.
  • the objects are tracked and logged, until they cross the threshold from the next zone, wherein the appropriate response for that zone is provided. As soon as the target crosses into the next zone, it is assigned the highest priority and receives the appropriate response.
  • the system can be programmed to concentrate on only the most serious threat (which is the target closest to the barrier) or to cycle through the objects issuing the appropriate responses, but assigning the resources to the most threat more often.
  • the system can be equipped to recognize friends.
  • the friends can have a transponder that operates on rf.
  • the transponder signals the radar and camera units.
  • the friendly object can then approach the pipeline without triggering the sonic blast.

Abstract

The invention provides autonomous defense of a facility having an adjacent restricted access area (25). There are provided detection devices and warning devices, as well as deterrent devices, the detection devices are radar units (15) and cameras (17) that detect an intruder within the restricted access area (25). Prior to the intruder entering the restricted area (25), the intruder is tracked. When the intruder approaches the facility at a predetermined distance, a warning is provided. If the intruder approaches closer to the facility (25), then a deterrent is provided. The deterrent can be loud uncomfortable sound or non-lethal munitions. If the intruder continues to approach the facility (25), the lethal responses can be delivered in the form of lethal sound or lethal weapons.

Description

MODULAR AUTONOMOUS PERIMETER SECURITY AND NON-LETHAL DEFENSE SYSTEM
SPECIFICATION
This application claims the benefit of provisional patent application Serial No. 60/592,851, filed IuIy 30, 2004.
Field of the Invention
The present invention relates to methods and systems for defending infrastructure facilities such as pipelines, storage facilities, utilities, etc.
Background of the Invention A concern to modern societies is the threat of terrorist acts against critical infrastructures. Many key infrastructure facilities, such as pipelines, refineries, above ground storage facilities, and other utilities, are considered vulnerable to potential terrorist attack.
Conventional security solutions are considered to be inadequate. For example, a fence located around an above ground storage facility may make it difficult for an intruder to come in actual contact with that facility, however an intruder could fire a weapon from a distance beyond the fence perimeter at the facility, inflicting damage. Also, some facilities, such as pipelines, are not easy to protect by barrier systems such as fencing. Installing and maintaining such barrier systems is not only cost prohibitive, but due to the remoteness of many pipelines, are simply ineffective. Protecting these facilities is important in order to maintain stability of markets and provide a steady supply of energy and other utilities.
Summary of the Invention The present invention provides a method of providing autonomous defense for a facility, the facility having an adjacent restricted access area. An intruder is detected in the restricted access area. A warning is delivered to the intruder in the restricted access area. After delivering the warning, it is determined if the intruder poses a threat to the facility. If so, then a deterrent is delivered to the intruder.
In accordance with one aspect of the present invention, after delivering the deterrent to the intruder, it is determined if the intruder continues to pose a threat to the facility and if so then firing a weapon at the intruder. In accordance with still another aspect of the present invention, detecting an intruder in the restricted access area further comprises utilizing radar to detect the intruder.
In accordance with another aspect of the present invention, delivering a warning to the intruder in the restricted access area further comprises delivering an audible warning.
In accordance with still another aspect of the present invention, determining if the intruder poses a threat to the facility further comprising determining if the intruder moves closer to the facility.
In accordance with still another aspect of the present invention, delivering a deterrent to the intruder further comprises delivering a disabling sound.
The present invention also provides a system for providing autonomous defense of the facility, the facility having an adjacent restricted access area. Detection devices are distributed so as to monitor the restricted access area for intruder. Warning devices are capable of delivering a focused warning to a specified location in the restricted access area. The warning devices are distributed over the restricted access area. A deterrent device is capable of delivering a focused deterrent to a specified location in the restricted access area. A processor communicates with the detection devices, the warning and the deterrent device. The processor receives inputs from the detection devices and determines the threat of an intruder in the restricted access area. The processor provides an output to command the warning device closest to the intruder to deliver the focused warning. The processor determines if the intruder moves closer to the facility and if so then provides an output to command the deterrent device closest to the intruder to deliver the deterrent to the intruder.
In accordance with one aspect of the present invention, the detection devices comprise radar units.
In accordance with another aspect of the present invention, the warning devices comprise sound emitters.
In accordance with still another aspect of the present invention, the deterrent devices comprise sound emitters. In accordance with one aspect of the present invention, the detection devices, warning devices and deterrent devices communicate over a distributor wireless network.
Brief Description of the Drawings Fig. 1 is a drawing showing a pipeline equipped with the system of the present invention.
Fig. 2 is a block diagram showing components of the system.
Fig. 3 is a radar image showing "allowed" and "unallowed" areas. Fig. 4 is a block diagram showing components of a digital gateway/recorder.
Fig. 5 is a block diagram of an acoustical, or sonic, device. Fig. 6 is a block diagram of a weapons unit. Fig. 7 is a block diagram showing the mesh network.
Description of the Preferred Embodiment
The present invention can be used to protect various types of infrastructure facilities, such as pipelines, refineries, above ground storage facilities, electrical utilities, airports, ships, ports, offshore facilities such as oil platforms, etc. and is particularly well suited to remote areas. In addition, the invention can be used along an intangible facility, such as a border between two countries.
In the description that follows, the particular facility discussed is a pipeline. In Fig. 1, there is shown a pipeline 11. Pipelines are particularly difficult to protect because in many places the pipelines are located on top of the ground and are thus easy to access. In addition, pipelines are capable of extending for miles and miles and are thus difficult to protect in a cost effective manner. The present invention provides a system and method that provides large area perimeter security and deterrents to intruders. The present invention utilizes detection devices to detect and track objects and intruders. An intruder can be an individual, a group of individuals, a vehicle or a number of vehicles. An object or target is a potential intruder that is tracked to determine if it intrudes into a restricted access area. If the intruder comes too close to the pipeline, then a warning is provided to the intruder to deter the intruder from the pipeline. After the warning, if the intruder continues to exhibit ill intent, such as moving closer to the pipeline, then action is taken to disable the intruder. The disabling action can be non-lethal or lethal. Also, warnings are sent to security personnel who guard the pipeline. The security personnel are dispatched to the site of the intrusion.
Thus, the present invention provides an automated detection and defense system for various types of facilities. The present invention operates automatically without the intervention of humans. The present invention serves not only to deter intruders, but also serves to buy time until security personnel can arrive on the scene.
One option is to allow a man in the loop so as to remove some autonomy, such as in delivering disabling or lethal deterrents.
The pipeline has a restricted access area 25, which is typically a zone or zones that extend out from the pipeline for some distance. The pipeline 11 is equipped with a number of devices 13. There are detection devices, which include radar 15 and cameras 17, and also warning and deterrent devices, which can include sonic devices 19 for providing warnings and sound barriers and weapons 20.
One of the detection devices is radar 15. Radar units 15 are distributed over the length of the pipeline 11. The radar units provide wide area surveillance and are capable of detecting and tracking personnel and vehicles at extended ranges. The radar units 15 provide 360 degree coverage and provide for terrain following in that the radar can be depressed or raised from the horizontal. The range resolution is about half a meter.
The radar units 15 can be programmed to provide "allowed" areas and "unallowed", or restricted, access areas. This is shown in Fig. 2, which shows an area 21 swept by a radar unit 15. Most of the area is considered an allowed area 23, with an inner area, of irregular shape, being considered a restricted access area 25. When an object, such as a person, or vehicle, is in either area 23, 25, the system actively surveils that object and tracks it. When an object is in the allowed area 23, the system does not consider such an object to be a threat. When an object is in the restricted access area 25, the system considers the object to be a threat. Fig. 1 shows another example of an allowed area 23 and a restricted access area 25 (which is divided into zones), as applied to the pipeline 11.
In the preferred embodiment, the radar units 15 have a range of about 12 km. Thus, the radar units are spaced apart from one another, along the length of the pipeline so as to provide a surveillance of satisfactory size about the pipeline. In some geographical locations, the range of a radar unit may be diminished, wherein the radar units are spaced more closely together. The radar devices are commercially available from Sensor Technologies and Systems, Inc. of Scottsdale, Arizona.
The radar units can be of two types. There is a main radar unit 15. The main radar unit is augmented by a series of small or "blind spot" radar units 16. A blind spot radar unit reports to a main radar unit.
Each device 13 has a control module 31, which will be described in more detail below with reference to Fig. 4. Each radar unit has a radar control module 31. The radar control module for the main radar units 15 are the cell controller for a particular cell. Each cell is a system in and of itself, and all decisions pertaining to a response within a cell can be made within that cell. Cells are comprised of a group of nodes. Each device 13 constitutes a node. The cells are a virtual concept, and not a physical representation, as a single device 13 can be assigned to two cells. The use of cells makes the system more autonomous and robust. The radar control module collects target information from the respective radar unit. If the target information is from a blind spot radar 16, it is mapped into the coordinate system of the main radar unit 15. The radar control module assesses the targets for speed and direction, based upon successive sweeps of the radar. It also makes the target information available to the cell controller module. The radar control module monitors and reports on the health of its attached radar unit. The radar control module requires its GPS (global positioning system) coordinates, as well as the GPS coordinates of its associated blind spot radars 16.
The other type of detection devices are cameras 17. In the preferred embodiment, the cameras are long range infrared cameras. The cameras are packaged in compact, ruggedized and sealed housings. The housing is purged with dry nitrogen in order to prevent condensation at lower temperatures. The optics of the camera are treated with a resistant carbon coating to protect against damage from salt water and sand. Various focal length motorized lenses can be used. In the preferred embodiment, the camera uses 25, 80 and 320 mm focal length lenses. The lenses can be switched by command for detection and recognition at distances ranging from 5 to 25 km. The camera can be remotely operated and can take still or video images. The video images can be displayed in analog or digital RS- 422 format. The camera comprises an InSb focal plane array sensor, 14-bit digital electronics and motorized optics.
In the preferred embodiment, the range of the cameras is considered to be about 12 km in clear weather and the cameras are spaced accordingly apart along the length of the pipeline. The cameras function in day or night, light or dark and in all weather conditions. In some geographical locations, a full 12 km camera range may not be possible, wherein the cameras are spaced closer together so as to provide complete peripherial coverage of the pipeline. The camera devices are commercially available from CEDIP Infrared Systems, of Croissy-Beaubourg, France.
Each camera 17 has a control module 31 which monitors the status of the camera and reports to the cell controller module. The control module, which knows its GPS coordinates, translates the target coordinates into local coordinates to allow the camera to be aimed at the target. The control module records and streams video from the camera.
The sonic devices 19 are long range audible devices (LRAD) and are capable of delivering high intensity sounds at some distance away from the structure. The sonic devices 19 have sound emitters that can be moved remotely so as to point to a particular location. The sound emitter(s) is a flat panel, multi-transducer, phase coherent emitter with 146dB of sustained sound delivery. The sound emitter projects sound at a frequency of 2.1-3.1 KHz. The volume ranges from 120 to 150 dB at hundreds of yards away. The sonic devices 19 can also produce verbal warning signals. The system is designed to provide a verbal warning signal of about 100 dB at a distance of 500 yards from the pipeline. If the intruder continues to move forward towards the pipeline, then a disabling sound of about 120 dB is provided. The sound can be from two distinct sources, one of which is hypersonic. The two sounds are sent in beams, which beams intersect at a desired location (the intruder's location) and create the sound as if it were generated at the intersection point rather than from the sources. Intersecting sound beams allows an increase of intensity at the target location to disabling and even lethal levels.
The sonic devices 19 are distributed so as to have two or three units per kilometer. The sonic devices are available commercially from American Technology Corporation of San Diego, California.
To my knowledge, the sonic devices have been used previously to provide a defense of navy ships. The devices have been manually triggered. The weapons 20 can be non-lethal, lethal, or a combination of the two. Non-lethal weapons include launchers for tear gas, pepper spray and stink bomb sticks. For example, a grenade launcher or mortar could be used. Other types of shells could be used, such as those containing rock salt and dyes. The weapons could also include a machine gun that fires rubber bullets.
Lethal weapons include guns, such as machines guns and grenade launchers with grenades or air burst munitions.
The weapons are located near the pipeline and can be aimed at the intended target. For example, a launcher can have horizontal and azimuth adjustments. The weapons are located in a sealed container to provide protection against the elements, thereby increasing reliability. The seal or container is broken upon firing.
Payloads can include: counter personnel, markers, taggants, incapacitants, malodorants, OC/RCA, Stingball Grenade, Fuzed Blunt Injury, counter materiel, Markers, taggants and Anti-traction.
Other less than lethal weapons can include: LIPC (Laser induced plasma channel) A device capable of delivering a lighting like bolt of electricity.
PEP (Pulsed Energy Projectile) a pulsed energy projectile (PEP) that superheats the surface moisture around a target so rapidly that it literally explodes, producing a bright flash of light and a loud bang. The effect is like a stun grenade, but unlike a grenade the pep travels at nearly the speed of light and can take out a target with pinpoint accuracy.
Vortex Launcher: a supersonic vortex of air hits its target at about half the speed of sound with enough force to knock them off balance.
HPM Vehicle Stopper: High power microwaves are focused on a fleeing vehicle so as to interrupt or disrupt vehicle engine operation or the functioning of electronics..
Tetanizing Beam Weapon as described in U.S. Patent # 5,675,103. (Tetanization is the stimulation of muscle fibers at a frequency which merges their individual contractions into a single sustained contraction.) This device uses two beams of UV radiation to ionize paths in the air along which electrical current is conducted to and from the target. The current within these beams is a close replication of the neuro-electric impulses that control skeletal muscles. It is imperceptible to the target person because it differs from their own neural impulses only in that its repetition rate is sufficiently rapid to tentanize muscle. (Tetanization is the stimulation of muscle fibers at a frequency which merges their individual contractions into a single sustained contraction.)Non-lethal deliverables include riot control agents, malodorants, and calmatives. Riot control agents (RCAs) include chemicals that irritate mucous membranes and cause lacrimation, irritation, or inflammation. RCAs produce rapid sensory irritation or disabling physical effects that disappear within a short time following termination of exposure. Most commonly known are oleoresin capsicum (OC), the active agent in hot peppers; chloroacetophenone (CN); and ochlorobenzylidene malononitrile (CS), or tear gas. Malodorants, are compounds with repulsive smells some of these materials are the active ingredients in the most disagreeable natural odors, and some are synthetic creations. Calmatives represent a class of chemical substances: the physiological effects of all calmatives that have been examined occur as a result of depression of the central nervous system, accompanied by mood alteration and respiratory depression. The generally desired ratio of exposure between an effective dose and death is on the order of 103 to 104. (By comparison, the margin of safety for exposure to RCAs such as the lacrimator CS is about 2,500 to 30,000 dose units.)
Directed-Energy Technologies: Directed energy may be divided into three categories (1) low-energy lasers and incandescent devices; (2) high- energy lasers; and (3) high-power millirneterwave and microwave devices. The category of low-energy lasers and incandescent devices includes laser dazzlers and flash grenades that use intense visible light to temporarily blind or disorient a person.
A second class of high-energy laser systems for antipersonnel application is the pulsed-energy projectile (PEP). PEP utilize's a pulsed deuterium-fluoride (DF) laser designed to produce an ionized plasma at the target surface. In turn, the plasma will produce an ultrasonic pressure wave that will pass into the body, stimulating the cutaneous nerves in the skin to produce pain and induce temporary paralysis.
High-Power Microwave and Millimeter- Wave Technology can be grouped into two subcategories: (1) those designed to disrupt electronic systems, such as communications and computer networks; and (2) those designed to produce a physiological effect on an individual. Still another sensor can be a sound sensor 39 which has a microphone input. This allows the monitoring and recording of sound at a remote sight.
Each device 13 has the option of having a video sensor for confirmation purposes. For example, the sonic device 19 can have a camera which provides images to provide confirmation if the intruder is moving away from the facility. In addition, the camera can be used for pinpoint aiming of the particular device.
As shown in Fig. 3, each device 13 (radar, camera, sonic) is able to communicate wirelessly with the other devices along the pipeline. Each device is capable of carrying out its function and communicating with the other devices. Each device 13 has a digital gateway/recorder 31 (DGR) which serves as a control module. The DGR 31 acts as a network interface unit, or gateway, and can also log data as well as record video. As shown in Fig. 4, each DGR 31 has a video input 42 to take video from any camera 17 as well as any confirmation camera on a device 13. The DGR also has an audio input 43 for the microphone. There is also an audio output 45 for delivering signals to the sonic device 19. Various ports are provided, such as a serial port 47 and an ethernet port 49 for communicating with peripheral devices as well as the overall network. The DGR is provided with a microprocessor 51, a memory 53 in the form of SDRAM, flash memory and SRAM, as well as disk drive. A TCP/IP network interface 55 is provided. A GPS unit 57 is provided to determine the positioning coordinates of the DGR unit. In addition, a video recording module 59 is provided which records video in the desired format. An audio recording module 61 is also provided. External inputs 63 can also be provided. An example of an external inputs is a door sensor to determine if the building housing the device has been breached. Fig. 5 shows a typical sonic device 19. There is a sound emitter 65, which is provided with a motor 67 so as to aim the emitter both horizontally and vertically. The sonic device also has a DGR 31, as well as a confirmation camera 69. The DGR functions as a control module for the sonic device. The control module 31 monitors and reports on the health of the attached sonic emitter, using the sonic emitter's onboard diagnostics, as well as microphone input. The control module also translates the radar coordinates to the local coordinates of the sonic device for positioning and manages any feedback loops for positioning. The appropriate audio messages are streamed and selected based on the request of the cell controller module. The sonic device control module initiates built in tones, and records the confirmation video.
Fig. 6 shows a typical weapon 20 such as a grenade launcher 71. The grenade launcher has a positioning motor 73, a fire control system 75, and a DGR 31. The control module for the weapon is a DGR which monitors and reports on the status of the platform and the weapon using built in diagnostics as well as a microphone. The coordinates of the radar are translated into local coordinates for rough platform positioning. The control module also manages any feedback loops for platform positioning. The control module begins the targeting of the weapon by the fire control system 75. The control module also triggers the weapon on command from the cell controller module. The control module programs detonation distances of the grenades and selects firing sequences based on the amount of ammunition. The amount of ammunition is determined by belt load data. The control module also records and streams confirmation video from a confirmation camera.
The cell controller module is the overall decision maker for a cell. It is present in all the DGR' s but is only activated in the DGR' s attached to the radar units 15. The cell controller module monitors and reports on the health on all nodes assigned to the cell and monitors and prioritizes the targets based on the information from the radar units 15. The program follows the programmed rules of engagement and commands the responding sonic devices 19 and weapons 20 to take the appropriate actions. The cell controller processes resource requests from surrounding cells based on their target information by comparing the surrounding cell target information with its own target information. The cell controller assigns its own resources, which are the devices, to other cells as required and controls the flow of video data over the network based on traffic. The cell controller requests manual confirmation (for man in loop systems) and processes the response and logs all operational nonvideo data.
The devices 13 communicate with each other over a mesh wireless radio frequency (rf) network (see Figs. 3 and 7). The wireless network consists of a transmitter and receiver 33 at each node. Each node can have only one device 13, or it may have two or more devices (such as a camera and a sonic device). The transmitter and receiver 33 are long range, fully integrated communication and control. The communication system uses frequency hopping spread spectrum technology to ensure secure and reliable communications. Data security is further enhanced through proprietary information packets, data compression and fast changing dynamic key encryption of the information that is communicated.
The transmitter has a range of between 40 to 56 km. It has line of sight distance using omnidirectional antennas. The output power is one watt maximum with 10 programmable steps ranging from 100 mw to 1 watt.
Modulation is spread spectrum, GFSK and frequency hopping is utilized.
There are 15 user selectable hop patterns. The occupied bandwidth is 230
KHz. The receiver has a sensitivity of - 110 dBm @ 10"4 raw BER; and - 108 dBm @ 10-6 raw BER. The selectivity is 40 dB @ fc +/-230 KHz; 60 dB @ fc +/- 460 KHz. The system gain is 135 dB.
The RF data transmission has a 32 bit CRC error correction. The transmission scheme utilizes substitution dynamic key for data encryption. The RF data rate is 144 kbps-188 kbps. The interface is *10 base-T (UTP), with one straight, one cross-pinned (only one connector can be used at a time). The data throughput is 108 Kbps maximum in point-to-point mode throughput measured assuming 75% frequency availability.
The antenna is a standard thread SMA female. Each device 13 has a unitized redundant power source 35 (see Fig. 3).
The power source can be a battery with a solar power supply and recharger.
A power source 35 can power one or more devices 13, the associated DGR
31 and transmitter receiver 33. Thus, the system is particularly robust as it is distributed along the length of the pipeline. Each device 13 can operate independently of the other devices in a stand alone configuration. Therefore, if one device becomes inoperable, then the whole system is not brought down. In operation, the radar units 15 scan for objects 41. Each of the
DGR' s for the radar units has software to detect movement in their sensing areas or fields of view.
When an object is detected, the object 41 is tracked. As the object 41 comes closer and closer to the pipeline, this movement is tracked by the radar. When the intruder is close enough it is tracked by the cameras 17.
The radar and cameras determine the location and range of the object 41 from the pipeline.
The system is programmed to deliver a response to the object based on distance, type of activity and so on. By tracking the object, particularly after delivery of warnings, the intent of the object can be verified, and a more robust response can be delivered.
Once detected and tracked, it is determined if the object/intruder 41 is a threat. The initial response is to deliver a warning. If either a radar unit or a camera unit, or both, detects an intruder within a restricted access zone, then the cell controller for that unit determines the closest sonic device or devices 19 to the intruder and signals those sonic devices 19. The cell controller unit knows the location of each sonic device as well as the network (ip) address of each sonic device. The signal tells the sonic device
19 to activate and provide a warning signal. The signal also provides the location of the intruder so that the sonic device can point toward the intruder.
Based on the information from the cell controller, one or more sonic devices 19 point toward the intruder. The camera on each sonic device provides accurate pointing. An audible warning signal is provided to the intruder. The warning signal is loud, about 100 dB, and warns the intruder to stay away, back up, etc.
The cameras and radar units 17, 15 monitor the intruder to see if the intruder falls back away from the pipeline or continues on an intersecting path. If the intruder retreats and moves away from the pipeline, the cameras and radar units instruct the sonic device to cease the audible warning signal. The cameras and radar units continue to track the intruder until it moves out ofrange.
If the intruder continues on an intersecting path to the facility, then the cell controller signals for a deterrent. One example of a deterrent is that the sonic device 19 produces a disabling sound. In each sonic device, the sound generator produces a disabling sound (120 dB or greater) and projects it in the direction of the intruder. The sound is strong enough so as to cause human beings extreme discomfort as the sound resonates inside of the skull of a human being. Ear plugs or other ear protection is inadequate to protect a human from the sound as the sound penetrates the skull independently of the ear canal. With the approach becoming more painful, the intruder should move away from the pipeline. In the meantime, the cell controller sends a signal to security personnel who can investigate the intrusion. The signal to security personnel can occur before the audible warning signal is sent.
An example will now be described. Rules of engagement are provided to the cell controller and are as follows. Referring to Fig. 1, objects 41 are identified when movement is detected within the scanning range of the radar 15, 16. Object threats are quantified by the object distance from the facility, or more specifically from the barrier 12, or edge, of the facility. The closer an object is to the barrier 12, the higher the threat and the more forceful the response. The system is configurable for both the number of threat levels and their distances from the barrier. In the case of multiple objects, the objects are prioritized for response based upon their projected time to reach the barrier. This determination is computed using the object's perpendicular approach speed to the barrier. This applies to objects on the same threat level. Once a object has crossed into a higher threat or response zone, it will be designated the highest priority, with the remaining objects being prioritized based upon their approach speed, but at lower levels of priority than the closest object.
Prioritization determines the response resource allocation. Objects 41 are allocated resources (for example sonic device messaging, weapons fire) based upon their threat priority. Resource allocation cycles through the objects in their prioritized order until the objects have been neutralized or the resources have been exhausted.
Overall, the rules of engagement are applied to objects that have intruded into the restricted access areas so as to provide a warning or deterrent to the object, to determine the object's response, and then if the object continues as a threat to increase the warning or deterrent. The rules are configurable on a per cell basis. Threat levels are calculated based upon an object's perpendicular distance from the barrier. The rules allow for a configurable number of distance bands or zones from the barrier, and allow for each band's distance to be configurable. In addition, the response by the system for each level is configurable.
For example, referring to Fig. 1, the pipeline 11 can have the following threat bands or zones: out to 10,000 meters, there is no threat (level 4), from 800 to 1200 meters is an initial threat zone (level 3), from 400 to 800 meters is an increased threat zone(level 2), from 200 to 400 meters is a serious threat zone (level 1) and from 0 to 200 meters out from the barrier is a grave threat zone (level 0). The number of threat thresholds and distances can be varied according to the circumstances. In the example, the restricted access area is levels 0-3, or from 0 out to 1200 meters. Beyond 1200 meters, the system merely tracks objects, monitoring movement to determine if the objects intrude into the restricted access area.
The response that is assigned to each level can also be varied. For example, if an intruder enters a particular zone, then the following responses are provided: track target and report (level 4) apply less hostile audible warnings announcing restricted area (level 3) apply hostile audible warnings (level 2) apply disabling tone (level 1) apply marking munitions (level 2) apply disorienting munitions (level 1) apply disabling munitions (level 1) apply lethal tone (level 0) apply lethal munitions (level 0).
Continuing with the example, if the object 41 enters the level 4 zone, then the object is identified by the radar 15, 16 and is reported and logged. If the object intrudes into the level 3 zone, the closest sonic device 19 is positioned to aim at the intruder 41. Initial, non-hostile audible messages are directed at the target by the closest sonic device 19. If the intruder continues to approach the barrier and enters the level 2 zone, the sonic device 19 cycles through more hostile messages. If the intruder continues to advance and enters the level 1 zone, then confirmation of a debilitating, disorienting or lethal response is requested. When the cell controller authorizes and provides confirmation, then the sonic device emits the debilitating and disorienting tone. The closest weapon 20 fires flash bang cartridges and marking cartridges in an effort to deter the target or intruder from further advance. If the intruder continues to advance and enters the level 0 zone, then the sonic device 19 or devices will emit its deadly tone and the weapon 20 will fire deadly ordinance to provide a lethal response.
If there are multiple objects, the multiple objects are identified in the level 4 zone. The cell controller prioritizes the objects by their predicted arrival at the barrier, based on their speed and heading. The objects are tracked and logged, until they cross the threshold from the next zone, wherein the appropriate response for that zone is provided. As soon as the target crosses into the next zone, it is assigned the highest priority and receives the appropriate response. The system can be programmed to concentrate on only the most serious threat (which is the target closest to the barrier) or to cycle through the objects issuing the appropriate responses, but assigning the resources to the most threat more often.
The system can be equipped to recognize friends. The friends can have a transponder that operates on rf. Thus, when the friendly object approaches, the transponder signals the radar and camera units. The friendly object can then approach the pipeline without triggering the sonic blast.
The foregoing disclosure and showings made in the drawings are merely illustrative of the principles of this invention and are not to be interpreted in a limiting sense.

Claims

MODULAR AUTONOMOUS PERIMETER SECURITY AND NON-LETHAL DEFENSE SYSTEMCLAIMS
1. A method of providing autonomous defense for a facility, the facility having an adjacent restricted access area, comprising the steps of: a) detecting an intruder in the restrictive access area; b) delivering a warning to the intruder in the restrictive access area; c) after delivering the warning, determining if the intruder poses a threat to the facility; d) if the intruder poses a threat to the facility, then delivering a deterrent to the intruder.
2. The method of claim 1, further comprising the steps of: a) if after delivering the deterrent to the intruder, determining if the intruder continues to pose a threat to the facility; b) if the intruder continues to pose a threat to the facility, then delivering a lethal response to the intruder.
3. The method of claim 1 wherein the step of detecting an intruder in the restricted access area further comprises the step of utilizing radar to detect an intruder.
4. The method of claim 1 wherein the step of delivering a warning to the intruder in the restricted access area further comprises delivering an audible warning.
5. The method of claim 1 wherein the step of determining if the intruder poses a threat to the facility further comprises the step of determining if the intruder moves closer to the facility.
6. The method of claim 1 wherein the step of delivering a deterrent to the intruder further comprises the step of delivering a disabling sound.
7. The method of claim 1 further comprising the step of detecting the intruder before the intruder enters the restricted access area.
8. The method of claim 1 wherein: a) the step of detecting an intruder in the restricted access area further comprises the step of utilizing radar for detecting an intruder; b) the step of delivering a warning to the intruder in the restricted access area further comprises the step of delivering an audible warning; c) the step of determining if the intruder poses a threat to the facility further comprises the step of determining if the intruder moves closer to the facility; d) the step of delivering a deterrent to the intruder further comprises the step of delivering a disabling sound.
9. A system for provide autonomous defense of a facility, the facility having an adjacent restricted access area, comprising: a) detection devices distributed so as to monitor the restricted access area for intruders; b) warning devices that are capable of delivering a focused warning to a specified location in a restricted access area, the warning devices being distributed so as to access the restricted access area; c) a deterrent device that is capable of delivering a focused deterrent to a specified location in restricted access areas; d) a processor that communicates with the detection devices, the warning devices and the deterrent devices, the processor receives input from the detection devices and determines the threat of an intruder in the restricted access area, the processor providing an output to command the warning device closest to the intruder to deliver a focused warning, the processor determining if the intruder moves closer to the facility and if so provides an output to command the deterrent device closest to the intruder to deliver a deterrent to the intruder.
10. The system of claim 9 wherein the detection devices comprise radar units.
11. The system of claim 9 wherein the warning devices comprise sound emitters.
12. The system of claim 9 wherein the deterrent devices comprise sound emitters.
13. The system of claim 9 wherein the deterrent devices comprise weapons. 4. The system of claim 9 wherein the detection devices, warning devices and deterrent devices communicate over a distributed wireless network.
PCT/US2005/026905 2004-07-30 2005-07-29 Modular autonomous perimeter security and non-lethal defense system WO2006093527A2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US59285104P 2004-07-30 2004-07-30
US60/592,851 2004-07-30
US14184505A 2005-06-01 2005-06-01
US11/141,845 2005-06-01

Publications (2)

Publication Number Publication Date
WO2006093527A2 true WO2006093527A2 (en) 2006-09-08
WO2006093527A3 WO2006093527A3 (en) 2007-01-25

Family

ID=36941583

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/026905 WO2006093527A2 (en) 2004-07-30 2005-07-29 Modular autonomous perimeter security and non-lethal defense system

Country Status (1)

Country Link
WO (1) WO2006093527A2 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2235704A2 (en) * 2007-12-16 2010-10-06 Maly Edelman Actively protecting an area
ITBO20120299A1 (en) * 2012-05-31 2013-12-01 Filippo Guerzoni DEVICE, SYSTEM AND METHOD OF SURVEILLANCE OF A VOLUME DEBT.
WO2015172209A1 (en) * 2014-05-15 2015-11-19 Tarcisio Caddah Melo System and method for protecting restricted-access areas against intrusions by pedestrians and/or non-cab vehicles in general, with access permitted for vehicles with a cab, including convertible vehicles with closed top
US9429405B1 (en) 2015-04-27 2016-08-30 Alfiero Balzano Less lethal ammunition
EP3098792B1 (en) * 2015-05-26 2018-11-21 Google LLC System and method for audibly announcing location of unauthorized party
WO2022144876A1 (en) * 2020-12-30 2022-07-07 Essence Security International (E.S.I.) Ltd. A device for monitoring an environment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4642612A (en) * 1984-06-18 1987-02-10 Crump Herschel W Intruder detection and deterrent system
US5532680A (en) * 1995-03-27 1996-07-02 Ousborne; Jeffrey Automatic message playback system
US5786760A (en) * 1995-03-08 1998-07-28 Suzuki; Tomohiko Alarm system with variable warning signal
US6466157B1 (en) * 2001-07-17 2002-10-15 Sensor Technologies & Systems, Inc. Electronic fence using high-resolution millimeter-wave radar in conjunction with multiple passive reflectors
US6943685B2 (en) * 2002-02-18 2005-09-13 Optex Co., Ltd. Intrusion detecting device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4642612A (en) * 1984-06-18 1987-02-10 Crump Herschel W Intruder detection and deterrent system
US5786760A (en) * 1995-03-08 1998-07-28 Suzuki; Tomohiko Alarm system with variable warning signal
US5532680A (en) * 1995-03-27 1996-07-02 Ousborne; Jeffrey Automatic message playback system
US6466157B1 (en) * 2001-07-17 2002-10-15 Sensor Technologies & Systems, Inc. Electronic fence using high-resolution millimeter-wave radar in conjunction with multiple passive reflectors
US6943685B2 (en) * 2002-02-18 2005-09-13 Optex Co., Ltd. Intrusion detecting device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2235704A2 (en) * 2007-12-16 2010-10-06 Maly Edelman Actively protecting an area
EP2235704A4 (en) * 2007-12-16 2012-11-21 Maly Edelman Actively protecting an area
ITBO20120299A1 (en) * 2012-05-31 2013-12-01 Filippo Guerzoni DEVICE, SYSTEM AND METHOD OF SURVEILLANCE OF A VOLUME DEBT.
WO2013179201A1 (en) * 2012-05-31 2013-12-05 Guerzoni Filippo Device, system and method for monitoring a predetermined space
US9881469B2 (en) 2012-05-31 2018-01-30 Filippo Guerzoni Device, system and method for monitoring a predetermined space
WO2015172209A1 (en) * 2014-05-15 2015-11-19 Tarcisio Caddah Melo System and method for protecting restricted-access areas against intrusions by pedestrians and/or non-cab vehicles in general, with access permitted for vehicles with a cab, including convertible vehicles with closed top
US10147291B2 (en) 2014-05-15 2018-12-04 Melo Tarcisio Caddah System and method for protecting restricted-access areas against intrusions by pedestrians and/or non-cab vehicles in general, with access permitted for vehicles with a cab, including convertible vehicles with closed top
US9429405B1 (en) 2015-04-27 2016-08-30 Alfiero Balzano Less lethal ammunition
EP3098792B1 (en) * 2015-05-26 2018-11-21 Google LLC System and method for audibly announcing location of unauthorized party
WO2022144876A1 (en) * 2020-12-30 2022-07-07 Essence Security International (E.S.I.) Ltd. A device for monitoring an environment

Also Published As

Publication number Publication date
WO2006093527A3 (en) 2007-01-25

Similar Documents

Publication Publication Date Title
US11879705B2 (en) System and method for active shooter defense
US7886648B2 (en) Systems and methods for area denial
US11315396B2 (en) Threat identification device and system with optional active countermeasures
US8172034B2 (en) System and method for generating and directing very loud sounds
US11574206B2 (en) Defense and denial method
TW468136B (en) Area weapons effect simulation system and method
EP0960048B1 (en) Non-lethal area denial device
JP4481812B2 (en) Aircraft defense methods against attacks using infrared sensors
RU2393419C2 (en) Device of self-defense for fighting transport means or other protected objects
US7312744B1 (en) System for administering a restricted flight zone using radar and lasers
US20110127328A1 (en) Dual Band Threat Warning System
WO2006093527A2 (en) Modular autonomous perimeter security and non-lethal defense system
EP2008026A2 (en) A system and method for generating and directing very loud sounds
RU2500035C2 (en) Method for remote exposure of hazardous object of given type to wave signals and apparatus for realising said method
AU8934101A (en) Method and device for stimulating detonating projectiles
KR102376867B1 (en) Method and apparatus for providing a dummy target to protect a vehicle and/or object from a radar guided tracking head
US20230099600A1 (en) Applications of ultra-short pulse laser systems
US11021249B2 (en) Drone-based, attacker neutralization
US20220057815A1 (en) Drone-based, attacker neutralization
US10665074B1 (en) Shooter suppression system
US11662183B1 (en) Systems and methods for automomous protection of satellites from hostile orbital attackers
HL et al. Directed energy technologies; weaponization and barrier applications
Carter et al. DE Weapons & Microwaves
RU2371665C2 (en) Method of protecting land- and sea-based equipment
Hamilton et al. Policy Implications of Non-Lethal Weapons

Legal Events

Date Code Title Description
NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase