Click here to make tpub.com your Home Page

Page Title: Section III. PRINCIPLES OF OPERATION
Back | Up | Next

Click here for thousands of PDF manuals

Google


Web
www.tpub.com

Home


   
Information Categories
.... Administration
Advancement
Aerographer
Automotive
Aviation
Construction
Diving
Draftsman
Engineering
Electronics
Food and Cooking
Logistics
Math
Medical
Music
Nuclear Fundamentals
Photography
Religion
   
   

 

TM 5-6350-275-10
Section III. PRINCIPLES OF OPERATION
1-14. FUNCTIONAL DESCRIPTION . ICIDS is a system of intrusion detection equipment that provides an early warning
indication of intrusion attempts to a central monitoring location. ICIDS is installed to enhance the physical security of
sites and assets. ICIDS is used by security forces as the principal element for intrusion detection. ICIDS components
are configured based on the required site level of protection.
Protection of assets consists of three functions. They are (1) intrusion detection within a specified area, (2) delay of
intruders once the protected zone has been penetrated, and (3) assessment of the intrusion and deciding the type of
security force response required to prevent asset compromise.
ICIDS provides early warning of attempted actions against a protected asset by an intruder. Intrusion into an area may
be attempted by forced entry, covert entry, or insider compromise. These tactics can be performed separately or in
combination. Intruders may be motivated to steal, sabotage, or learn about the protected asset.
Functional aspects of the ICIDS equipment are described in the following.
a. Primary Monitor Console (PMC). The Primary Monitor Console (PMC) has software used to control the system.
The program is invoked when the system is initialized and acquires data from each Remote Area Data Collector (RADC)
it is monitoring. If a Remote Area Data Collector (RADC) fails to respond the system alarms and notifies the operator.
b. Operator Workstation. The Operator Workstation allows operators to monitor the status of all equipment within
the security system. Commands are entered into the system using the workstation keyboard. A legend of the available
soft-keys appears on each operator's display and changes to reflect alternative soft-key options.
c. Remote Area Data Collector (RADC). A network of Remote Area Data Collectors (RADCs), monitors and
controls all intruder detection and access control equipment. Each Remote Area Data Collector (RADC) compiles a list
of readings and changes which it transmits to the Primary Monitor Console (PMC). The readings are then processed and
stored, and operators' displays are updated to reflect any detected changes.
d. Closed Circuit Television (CCTV) System
(1) Purpose. The Closed Circuit Television (CCTV) enables operators to visually assess the causes of intrusion at
a remote site. The video can be viewed on one or more monitors which display the pictures received from a network of
Closed Circuit Television (CCTV) cameras. The operator may use the workstation keyboard to direct the scenes of a
particular camera onto a chosen monitor.
(2) Monitors. Video monitors provide near real-time threat assessment capability. Video from cameras in
protected areas is displayed as the result of an alarm or by operator selection.
(3) Cameras. The cameras are monochrome cameras used for surveillance of protected areas. The cameras
allow threat assessment and recording. Interior cameras are installed either without housings or in tamper protected
housings. Exterior cameras are installed in tamper protected housings.
(4) Video Synchronization Generator . The video synchronization generator generates horizontal drive, vertical
drive, blanking, and synchronization signals for transmission to the video cameras when synchronization is required.
1-34

Privacy Statement - Press Release - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business