Eagle Pass Regional ITS Architecture (Final)

Element Expanded Functional Requirements: Eagle Pass International Bridge System


Functional Area: Center Secure Area Surveillance
  1. The center shall remotely monitor video images and audio surveillance data collected in secure areas including facilities (e.g. transit yards) and transportation infrastructure (e.g. bridges, tunnels, interchanges, roadway infrastructure, and transit railways or guideways). The data may be raw or pre-processed in the field.
  2. The center shall remotely monitor video images and audio surveillance data collected in traveler secure areas, which include transit stations, transit stops, rest areas, park and ride lots, and other fixed sites along travel routes (e.g., emergency pull-off areas and travel information centers). The data may be raw or pre-processed in the field.
  3. The center shall remotely monitor video images and audio surveillance data collected on-board transit vehicles. The data may be raw or pre-processed in the field.
  4. The center shall exchange surveillance data with other emergency centers.
  5. The center shall identify potential security threats based on collected security surveillance data.
  6. The center shall verify potential security threats by correlating security surveillance data from multiple sources.
  7. The center shall remotely control security surveillance devices in secure areas including facilities (e.g. transit yards) and transportation infrastructure (e.g. bridges, tunnels, interchanges, roadway infrastructure, and transit railways or guideways).
  8. The center shall remotely control security surveillance devices in traveler secure areas, which include transit stations, transit stops, rest areas, park and ride lots, and other fixed sites along travel routes (e.g., emergency pull-off areas and travel information centers).
  9. The center shall remotely control security surveillance devices on-board transit vehicles.
  10. The center shall match traveler video images against a database from the Alerting and Advisory Systems of known images that may represent criminals and terrorists.
  11. The center shall exchange traveler images with other emergency management centers to support traveler image matching.
  12. The center shall respond to control data from center personnel regarding security surveillance data collection, processing, threat detection, and image matching.
  13. The center shall monitor maintenance status of the security sensor field equipment.
Functional Area: Center Secure Area Sensor Management
  1. The center shall remotely monitor and control security sensor data collected in secure areas including facilities (e.g. transit yards) and transportation infrastructure (e.g. bridges, tunnels, interchanges, roadway infrastructure, and transit railways or guideways). The types of security sensor data include environmental threat (e.g. chemical agent, toxic industrial chemical, biological, explosives, and radiological sensors), infrastructure condition and integrity, intrusion and motion, and object detection sensors. The data may be raw or pre-processed in the field.
  2. The center shall remotely monitor and control security sensor data collected in traveler secure areas, which include transit stations, transit stops, rest areas, park and ride lots, and other fixed sites along travel routes (e.g., emergency pull-off areas and travel information centers). The types of security sensor data include environmental threat (e.g. chemical agent, toxic industrial chemical, biological, explosives, and radiological sensors), intrusion and motion, and object detection sensors. The data may be raw or pre-processed in the field.
  3. The center shall remotely monitor and control security sensor data collected on-board transit vehicles. The types of security sensor data include environmental threat (e.g. chemical agent, toxic industrial chemical, biological, explosives, and radiological sensors) and object detection sensors. The data may be raw or pre-processed in the field.
  4. The center shall exchange security sensor data with other emergency centers.
  5. The center shall identify potential security threats based on collected security sensor data.
  6. The center shall verify potential security threats by correlating security sensor data from multiple sources.
  7. The center shall perform threat analysis based on correlations of security sensor and surveillance data.
  8. The center shall exchange threat analysis data with Alerting and Advisory Systems and use that data in local threat analysis processing.
  9. The center shall disseminate threat information to other agencies, including traffic, transit, maintenance, rail operations, and other emergency management centers.
  10. The center shall respond to control data from center personnel regarding security sensor data collection, processing, threat detection, and threat analysis.
  11. The center shall request activation of barriers and safeguards on request from center personnel.
  12. The center shall monitor maintenance status of the security sensor field equipment.