This invention relates to a system and/or method for securing areas (e.g. airport terminals, courtrooms, embassies, borders, property surrounding critical infrastructure, areas within cities/towns) from terrorists. In certain example embodiments of this invention, a system and/or method is provided wherein individuals pass (e.g. walk, drive, etc.) through a gateway before gaining access to a secured area. Signals capable of detonating certain explosives that might be carried by the individuals passing through the gateway are emitted by the gateway structure. Preferably, the gateway is mechanically shielded to minimize damage to surrounding areas and individuals should a detonation occur in the gateway.
This country currently is waging a war against terrorism. Terrorism typically involves, for example, violent acts by an inherently weaker party against a stronger opponent. Terrorist tactics attempt to create fear through actual damage and unpredictability, the latter of which seemingly magnifies the impact of each successful attack. Defending against terrorist attacks frequently is not efficacious because, for example, members of the public tend to focus only on successful attacks while viewing money invested in other (e.g. untested or unnoticed) countermeasures as wasted. The public typically does not perceive the preventative measures taken by authorities unless they fail. Thus, the cost of a failure is readily discernable, whereas any increased deterrent effects are difficult to measure.
Modern-day terrorists, e.g., suicide/homicide bombers, threaten our forward-deployed missions and forces, as well as civilians, as indicated by the U.S. embassy bombings in Kenya and Tanzania in 1998, the U.S.S. Cole bombing in Yemen, and frequent attacks on U.S. and Iraqi forces in Iraq. And the events of Sep. 11, 2001 proved that suicide attacks are not confined to the Middle East.
The number of places that need to be protected against terrorists is large. Such places include traditional areas associated with checkpoints, such as, for example, airports, courts, seats of government (e.g. embassies, state legislatures, Congress, the White House, etc.), border-crossings (both inter- and intra-nationally), military bases, government installations, etc. Critical infrastructure (including, for example, water treatment and/or dispensation facilities, power plants, communications hubs, etc.) also needs to be protected. Amusement parks, stadiums, malls, subways, and other areas where people congregate also may be deemed necessary to secure in certain situations. Thus, areas within buildings, blocks in cities, and entire cities may need to be secured, particularly from suicide attacks, in certain instances.
Requiring people to pass through metal detectors at airports helps prevent some attacks by, for example, detecting guns and knives. However, metal detectors cannot always detect all weapons (e.g. plastic explosives, weapons that require some assembly, etc.). Moreover, by the time some weapons are detected, it may well be too late to take action and/or prevent carnage. For example, a terrorist may detonate an explosive as soon as it is detected. Indeed, an explosive may be detected while a terrorist is waiting in line to be screened. Such attacks were common at border-crossings between Israel-proper and the Disputed Territories (e.g. the Gaza Strip and the West Bank). These problems exist where checkpoints and metal detectors exist, and the problems are exacerbated where there are no such checkpoints. Bombs can be placed in concealed locations and detonated when innocent people come near them. For example, there are few, if any, trash-cans in the London Underground after the IRA purportedly continued to hide explosives therein. And, these days, cell phones even can detonate explosives remotely. Similar problems exist as individuals move in, through, and around other of the above-described areas.
Accordingly, these and other areas must be secured against threats of these and other kinds. Thus, it will be appreciated that there is a need for a system and/or method for securing areas. In certain example embodiments, a method of securing an area is provided. Certain example methods are comprised of permitting an individual or a group of individuals to enter into a gateway; emitting at least one signal in or proximate the gateway to detonate any explosives being transported by the individual or the group of individuals; and, when the at least one signal does not cause an explosion, allowing the individual or group of individuals to exit the gateway. In certain example embodiments, the signal may be one or more of an electrostatic discharge, electromagnetic waves, an electric arc, a voltaic arc, and/or at least one cellular signal.
In certain example embodiments, the individual or the group of individuals may be required to comply with at least one command of an official at a checkpoint. The command may be, for example, for the individual and/or the group of individuals to remove all metal, to turn off all electronic devices, and/or to wait. Certain example embodiments may also comprise sealing an entry door and/or an exit door after the individual or the group of individuals has entered the gateway; and, opening the entry door and/or the exit door after the at least one signal has been emitted.
In certain example embodiments, it is possible to limit only one individual or one group of individuals to enter into the gateway at a time. In some example embodiments, the individual and/or group of individuals walk into the gateway, whereas in certain example embodiments the individual and/or group of individual enter the gateway via an automobile.
Certain exemplary systems for securing an area are also provided. They may be comprised of a gateway through which an individual or a group of individuals must pass; and, a detonator capable of emitting signal(s) to detonate explosives that the individual or the group of individuals may be carrying. Preferably, the gateway is mechanically fortified so as to minimize damage from the potential explosion and/or debris from the explosion.
In certain example embodiments, the gateway may be a tunnel enclosed in and/or constructed from a blast resilient material, and in certain example embodiments, the blast resilient material is comprised of steel and/or a resilient polymer. Certain example embodiments further comprise an entry door and/or an exit door, and in certain example embodiments, the entry door and/or the exit door is comprised of a blast resilient material.
In certain example embodiments of this invention, there is provided a system for securing an area, comprising: a gateway through which an individual or a group of individuals must pass; and, a detonator capable of emitting at least one detonation signal in or proximate the gateway, the detonation signal being sufficient to detonate explosives that the individual or the group of individuals may be carrying; and wherein the gateway is mechanically fortified so as to minimize damage from the explosion and/or debris from the explosion.
These and other features and advantages will be better and more completely understood by reference to the following detailed description of exemplary illustrative embodiments in conjunction with the drawings, of which:
Referring now to the drawings,
Only one gateway 12 is shown in
A gateway 12 may have points of entrance/exit 14 and 16. In
A gateway 12 may be bounded by gateway walls 18. In certain example instances, gateway walls 18, as well as points of entrance/exit 14 and 16, are comprised of a material capable of withstanding enormous pressure from explosions, heat, flying debris, etc. Gateway walls 18 may be constructed, in part, from steel, a highly resilient plastic or polymer, etc. The exact pressure, heat, etc. a particular structure can withstand will depend, in part, on the type of material from which it is constructed. Thus, one should exercise care when evaluating the risk and designing a gateway structure, for example, weighing the costs and benefits of certain designs and improvements on such designs.
In certain example embodiments, gateway walls 18 may be “reinforced” by the very lay of the land. For example, if there is only one route into or out of a city, a gateway may exist well outside of the city, for example, in farm country. In this case, individuals with explosives passing through a gateway well outside the city limits may be stopped without too much worry regarding the effects of the surrounding territories. Thus, in certain example embodiments, gateway 12 need not have any boundary wall at all, provided that the topography of the land and the location of the gateway allows for such a configuration. Moreover, in certain example embodiments, gateway 12 may be a tunnel, partially or completely underground, and in certain example embodiments, gateway 12 may or may not have a roof (fortified or unfortified) covering the area.
Optionally, manned checkpoints may be present outside of gateway 12 at least on the incoming side thereof. It will be appreciated that any of such manned checkpoints should be shielded from any blast that might occur within gateway 12. Such gateways or checkpoints may be used, for example, to prevent multiple individuals from entering gateway 12 at once, to isolate exposure to detonator 12, to make sure individuals turn off electronic devices and/or leave electronic devices outside of gateway 12 for collection later, etc.
It also will be appreciated that gateway 12 may allow individuals to walk, drive, etc. through it and into secured area 10. Accordingly, gateway 12 may, depending upon the example embodiment implemented, detonate one or more of a personal explosive (e.g. an explosive vest), plastique explosives, fertilizer-type explosives (e.g. similar to those used in the Oklahoma City Bombings), etc.
In step S20 of
In step 22, currents are generated in or proximate the gateway 12 to complete circuits. This step is designed to, for example, remotely detonate explosives, independent of the individual passing through the gateway, with minimal harm to others, etc. To protect against cell phone detonated bombs, step 22 also may initiate a range of cellular band broadcasts. It will be appreciated that other techniques for detonating explosives may be used in combination with, or in place of, those described herein.
Step 24 determines whether step 22 resulted in a detonation. If there is no detonation, in step S26, an individual exits the gateway and enters a secured area 10. It will be appreciated that in certain example embodiments, individuals may enter into a non-secured area after passing through the gateway. Although not shown in
If, however, a detonation occurs in step S24, the preparing step S28 may be more complicated. For example, if there is an explosion, debris will need to be cleaned up. Additionally, reports may be generated to catalog information about the explosion, such as, for example, the date and/or time of the explosion, the frequency that caused the explosion, the size of the blast, the type of explosive that was detonated, any information about the individual(s) passing through the gateway, etc. Such reports may be analyzed later, for example, to provide information on terrorist tracking, to adduce larger plots and/or schemes, etc.
For the purposes of these examples, explosives' detonators are assumed to be electrostatic discharge sensitive (ESDS) devices. Accordingly, one way a circuit controlling the detonation of explosions can be completed is by causing an electrostatic charge to hit the device. A number of models of electrostatic testing devices are well known, and any could be substituted, modified, or used in combination with this invention. It will be appreciated that the exact voltages, ohms, etc. used may be modified depending on, for example, the situation, safety concerns, etc.
The Human Body Model (HBM) is the oldest and most commonly used model for classifying device sensitivity to electrostatic discharge (ESD). This is of course used for example non-limiting purposes.
When a circuit of an explosive device being carried by a terrorist in a gateway 12 is completed by any of the circuit completing techniques discussed herein, the explosive detonates thereby destroying the explosive and killing the terrorist(s).
In certain example embodiments, circuits may be completed by using electric arcs and/or voltaic arcs. Briefly, two elements (e.g. two electrodes) are brought into proximity with each other (e.g., on opposite sides of the gateway 12). Then, the currents are arced (e.g. by slowly moving the two elements away from each other). Preferably, this method closes any open circuits and thus detonates any explosives in the gateway 12. Currents also may be arced in certain example embodiments comprised of large magnets. In certain example embodiments, a gas may be introduced into the gateway 12 to better facilitate the creation and travel of currents through air. Care must be taken, as arcs can result in very high temperatures. Thus, in certain preferred embodiments (similar to those used for lighting), low-pressure arcs are used to complete an explosive circuit in the gateway 12 thereby detonating the explosive in the gateway.
A detonator 20 as in
In certain example embodiments of this invention, the exit door out of the gateway will not open until (a) the entrance door to the gateway has been closed, and (b) a predetermined period of time X has elapsed following closing of the entrance door that is selected to permit the detonation signal to be applied to person(s) in the gateway. In certain example embodiments, the predetermined period of time X is from about 1-15 seconds, more preferably from about 2-10 seconds. In other example embodiments of this invention, the entrance door to the gateway sill not open until (a) the exit door out of the gateway has been closed, and (b) a predetermined period of time X has elapsed following closing of the exit door. Again, time X may be from about 1-15 seconds, more preferably from about 2-10 seconds.
While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not to be limited to the disclosed embodiment, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.
Number | Date | Country | |
---|---|---|---|
Parent | 11378636 | Mar 2006 | US |
Child | 12805034 | US |