Paper
28 August 1992 Integrated geophysical approach to the detection of buried objects and clandestine tunnels
James W. Allen
Author Affiliations +
Abstract
A planned and integrated geophysical approach, using all available data, has proven effective in detecting shallow tunnels and buried objects in different geological environments. Elements of the integrated approach included information from intelligence, historical reviews, computer modelling, and multiple geophysical survey methods. The use of the integrated approach resulted in a higher rate of success in detecting tunnels and small objects at shallow depths; however, no single survey technique has been universally effective. Several different survey methods were used to determine specific characteristics of a potential target. Magnetic sensors detected ferromagnetic materials used in tunnel construction. Analyses of the magnetic anomaly characteristics and the surface patterns of the anomalies indicated the depth and path of the tunnel. Tunnels were also detected by intrinsic parameters of observed electromagnetic anomalies and the surface patterns of instrument responses. Both methods have successfully differentiated materials used in tunnel construction and operational support systems from surface features such as utility or sewer lines. Cross-borehole radar was used to confirm the existence of a deep tunnel through crystalline rock in the southern part of the Demilitarized Zone in the Republic of Korea. Additional indications of tunnels were obtained from analyses of migrated seismic compression waves (P-waves) collected by a vertical stack, common- midpoint method. Ground-penetrating radar (GPR) and magnetic and EM sensors were effective in detecting shallow-depth caches constructed of various materials.
© (1992) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
James W. Allen "Integrated geophysical approach to the detection of buried objects and clandestine tunnels", Proc. SPIE 1693, Surveillance Technologies II, (28 August 1992); https://doi.org/10.1117/12.138104
Lens.org Logo
CITATIONS
Cited by 3 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Magnetism

Target detection

General packet radio service

Computer simulations

Electromagnetism

Surveillance

Modeling

Back to Top