Open Access. Powered by Scholars. Published by Universities.®

Civil and Environmental Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Geotechnical Engineering

Selected Works

Radar

Articles 1 - 2 of 2

Full-Text Articles in Civil and Environmental Engineering

Tunnel Detection Using Cross Borehole Radar, Clay Kurison, Arvin M. Farid, Akram N. Alshawabkeh, Carey M. Rappaport Apr 2012

Tunnel Detection Using Cross Borehole Radar, Clay Kurison, Arvin M. Farid, Akram N. Alshawabkeh, Carey M. Rappaport

Akram N. Alshawabkeh

Shallow tunnels present both military and homeland security threats. Smugglers with intentions of avoiding border security have turned tunnels into transit routes for trafficking weapons, people, drugs and other illegal materials. Shallow tunnels are also used by prisoners to escape prisons. While drug and human trafficking have long been border concerns, the threat of international terrorism has transformed the effort to detect tunnels into a national security priority. Imminent threats include assailants entering military fortifications by burrowing under buildings, detonation of high grade explosives from foundations of high security facilities, and high level prisoners escaping detention centers through tunnels. Real-time …


Tunnel Detection Using Cross Borehole Radar, Clay Kurison, Arvin M. Farid, Akram N. Alshawabkeh, Carey M. Rappaport Apr 2012

Tunnel Detection Using Cross Borehole Radar, Clay Kurison, Arvin M. Farid, Akram N. Alshawabkeh, Carey M. Rappaport

Carey Rappaport

Shallow tunnels present both military and homeland security threats. Smugglers with intentions of avoiding border security have turned tunnels into transit routes for trafficking weapons, people, drugs and other illegal materials. Shallow tunnels are also used by prisoners to escape prisons. While drug and human trafficking have long been border concerns, the threat of international terrorism has transformed the effort to detect tunnels into a national security priority. Imminent threats include assailants entering military fortifications by burrowing under buildings, detonation of high grade explosives from foundations of high security facilities, and high level prisoners escaping detention centers through tunnels. Real-time …