Second Sight™ Smart Border Protection
Second Sight, an intuitive power of perception that transcends the other five senses.
Designed to protect sensitive borders that face repeated incursions from hostile forces, Ador's Second Sight™ Smart Border Protection Solutions incorporates a host of sensor based technologies to allow cameras to acquire and detect threats in a more focused and autonomous manner, escalating alarms to command and control centres once a threat has been confirmed. These solutions can distinguish between humans and machine intrusions.
SECOND SIGHT™ SMART BORDER SOLUTIONS
These solutions can be deployed with or without a physical border fence in place. The Smart Border Solution typically includes:
Digital High definition Video Cameras
Such cameras may or may not have edge analytics based on the level of sophistication demanded by the mission. Cameras are typically linked so that a seamless handover occurs from one camera to another when a subject moves outside its pan, tilt or zoom capability (i.e. a set of cameras all talk to each other autonomously knowing where to look and when). High definition cameras, including those that can see in full colour in zero lux at night are manufactured by ADOR in India.
Optical Fibre Cables
An detection system which utilises fibre optic cable as the waveguide sensor, integrating weather-protected fibre optic cables along the complete perimeter fence or underground along a fence of a base or critical location. Using an
Optical Time Domain Reflectometer
The condition of the fibre cable is monitored continuously. Any breakage, tension, vibration is recognized immediately due to the change in light transmission creating an alarm pinpointing the exact location along the fence.
Unattended Sensors
An unattended sensor could be an underground vibration sensor, an underwater movement sensor or any sensor that passively monitors a given location / area and creates an alarm when a change occurs, allowing cameras to focus on the area and run software algorithms to determine the threat.
Radar
In addition to the integrated equipment above, a high level perimeter protection system will often employ radar to detect movement close to the perimeter fence or inside a particular perimeter area, identifying movement of objects and informing cameras where pant, tilt, zoom and focus. Radar systems can also be integrated using RFID to deploy Identify Friend or Foe (IFF) technology as well. Ability to function in extreme weather conditions of fog and snow.
Electro Optic (E/O) Sensors
An EO sensor is an integrated day night and Thermal Cameras with Pan, Tilt and zoom system. These are capable of long distance Detection (over 20km), Recognition and Identification ranges. These are capable of distinguishing between Vehicles and Humans.
Long Range Cameras
Depending on the size of the base and the terrain – sometimes a long range camera which can see 5 kms in the day and 3 kms at night or 1 km in fog maybe deployed as well. Such cameras in essence act as heavy duty binoculars and are triggered when any of the sensors above have detected a threat, proven as not a false alarm and the threat is in an area not very well covered by existing cameras. Ideally located on high points such as an Air Traffic Control (ATC) tower, these cameras provide maximum visibility in adverse conditions from a high vantage point. Ador manufactures long range 5km cameras in India.
Aero Stats or drones
To provide long range visibility in day and night an aero stat or done which can operate from 500 feet to 5000 feet can be deployed at a distance from the sensitive border, allowing continuous CCTV coverage whenever required.
Anti-Drone
These solutions use Radars to detect Drones, UAV’s, Low flying objects, etc and automatically focus the EO sensor tracking the target, . Solutions provide needed inputs for interface with weaponry systems for action.
Command and Control Centre
All the sensors and cameras are linked back to a C2 room which is ballistic Level III certified. The C2 software determines threats once a sensor has picked up an anomaly, confirms this using inputs from other sensors and then targets a camera capable of acquiring the intrusion risk in the area. Software algorithms can determine the threat confirmed on the relevant camera and escalate this as an alarm to personnel for a decision to be made on the type of response.