Systems and methods for optical secure alarmed protective fiber distribution systems and management

ABSTRACT

A fiber optic network has alarmed fiber optic lines in the cables connecting a secured junction box to plural user lock boxes. An outgoing alarm line and return alarm line in each cable connect the junction box to each user box. The outgoing alarm line is looped to the return alarm line inside the user lock box. The return alarm line is looped to the outgoing alarm line of a different cable inside the junction box to interconnect a plurality of alarm lines passing through a plurality of user boxes. A detector detects an alarm signal in the connected alarm lines to trigger an intrusion alarm.

CROSS-REFERENCE TO RELATED APPLICATIONS

Application claims priority to Provisional Patent Application No.61/321,317 filed Apr. 6, 2010, the complete contents of which areincorporated herein by reference.

BACKGROUND OF THE INVENTION

Data is sent to computers or sent among computers by electromagnetictransmission through the air (e.g., laser or Wi-Fi), or is sent throughwires (typically copper or aluminum), or is sent by fiber optic cables.The transmitted data must be protected in order to guard againstintruders intercepting data as it is transmitted. The transmitted datamay be encrypted, but encryption impedes potential use of the data anddoes not restrain the interception of the data in the first place.Encryption also requires time and equipment to encrypt the data, and todecrypt the data, thus increasing expense and causing delays intransmitting and using the data. Since data transmitted over the airwaysis subject to interception, data transmission over wires or opticalcables provides improved resistance to interception.

There is thus a need for an improved way to monitor data transmissionbetween computers or to computers. The U.S. Government need for securityand the related development of SIPRNET, JWICS and other secure networksreflects this need for improved ways to prevent data interception or tomonitor data to give an alarm when attempts are being made to interceptthe transmitted data.

Protective distribution systems are used to deter, detect and/or makedifficult the physical access to the communication lines carrying data,especially national security information. Approval authority, standards,and guidance for the design, installation, and maintenance forprotective distribution system are stated in NSTISSI 7003. Therequirements of this publication apply to U.S. government departmentsand agencies and further apply to contractors and vendors of thesegovernment departments and agencies. Hardened distribution protectivedistribution systems provide significant physical protection and aretypically be implemented in three forms: Hardened Carrier protectivedistribution systems, alarmed carrier protective distribution systemsand Continuously Viewed Carrier protective distribution systems.

In a hardened carrier protective distribution system the data cables areinstalled in a carrier constructed of electrical metallic tubing(electrical metallic tubing), ferrous conduit or pipe, or ridged sheetsteel ducting. All of the connections of the tubing, conduit etc. in ahardened carrier system are permanently sealed around all surfaces withwelds, epoxy or other such sealants. If the hardened carrier is buriedunder ground, to secure cables running between buildings for example,the carrier containing the cables is encased in concrete. The only wayto access the data transmission lines is to break through the enclosingphysical barrier, and doing so leaves signs of the intrusion which canbe detected.

With a hardened carrier system, detection of attempts to intercept thetransmitted data is accomplished by human inspections that are requiredto be performed periodically. Visual inspection requires that hardenedcarriers be installed below ceilings or above flooring so the physicalstructure enclosing the data transmission lines can be visuallyinspected to ensure that no intrusions have occurred. These periodicvisual inspections (passive visual inspections) occur at a frequencydependent upon the level of threat to the environment, the securityclassification of the data being transmitted, and the access control tothe area being inspected. Such inspections are costly, subject toinspection error which fails to detect intrusions, and limits thelocation of the data carrier.

Legacy alarmed carrier systems monitor the carrier containing the datatransmission cables being protected. More advanced systems monitor thefibers within the carrier, or are made intrinsic to the carrier, withthe cables being protected by turning those cables into sensors, whichsensors detect intrusion attempts. But again, such systems are expensiveto install, especially if the wire cables serve the dual purpose ofacting as intrusion sensors while others transmit data.

Depending on the government organization, using an alarmed carrierprotective distribution system in conjunction with suitable protectionat cable junctions may, in some cases, allow for the elimination of thecarrier systems altogether. In these instances, the cables beingprotected can be installed in existing conveyance mechanisms (wirebasket, ladder rack) or installed in existing suspended cabling (onD-rings, J-Hooks, etc.).

A Continuously Viewed Carrier protective distribution system is one thatis under continuous observation, 24 hours per day (including whenoperational). Viewing circuits may be grouped together to show severalsections of the distribution system simultaneously, but should beseparated from all non-continuously viewed circuits in order to ensurean open field of view of the needed areas. Standing orders typicallyinclude the requirement to investigate any viewed attempt to disturb theprotective distribution system. Usually, appropriate security personnelare required to investigate the area of attempted penetration within 15minutes of discovery. This type of hardened carrier is not used for TopSecret or special category information for non-U.S. Continuously viewingthe data distribution system is costly and subject to human error.

Simple protective distribution systems are afforded a reduced level ofphysical security protection as compared to a Hardened Distributionprotective distribution system. They use a simple carrier system (SCS)and the following means are acceptable under NSTISSI 7003: (1) the datacables should be installed in a carrier; (2) The carrier can beconstructed of any material (e.g., wood, PVT, electrical metallictubing, ferrous conduit); (3) the joints and access points should besecured and be controlled by personnel cleared to the highest level ofdata handled by the protective distribution system; and (4) the carrieris to be inspected in accordance with the requirements of NSTISSI 7003.But this approach also requires high costs, inspections, and manualinspections.

Increasing bandwidth and security demands in Local Area Networks (LAN)are leading to a shift form copper to fiber optic materials to carry thetransmitted data. This increased bandwidth will also requireFiber-to-the-Desk (FTTD) as part of the required local area network. Theterm fiber-to-the-desk is used to describe the (usually) horizontalorientated cabling in the areas of data transmissions andtelecommunication, which leads from the floor distributor to the outletsat the workplace on that floor, providing fiber-optic cable transmissionto each desktop computer. In the standards ISO/IEC 11801 and EN 50173this is the tertiary level.

In a secure fiber optic network application Tactical Local Area NetworkEncryption TACLANE) is a network encryption device developed by theNational Security Agency (NSA) to provide network communicationssecurity on Internet Protocol (IP) and Asynchronous Transfer Mode (ATM)networks for the individual user or for enclaves of users at the samesecurity level. Tactical local area network encryption allows users tocommunicate securely over legacy networks such as the Mobile SubscriberEquipment (MSE) packet network, Non-Secure Internet Protocol RouterNetwork (NIPRINet), Secret Internet Protocol Router Network (SIPRNet),and emerging asynchronous transfer mode networks. The tactical localarea network encryption limits the bandwidth of a secure fiber opticnetwork to 1 to 10 Gb/s depending on the type network. Providing asecure alarmed protective fiber distribution system enables removing thetactical local area network encryption thereby allowing for 40 Gb/snetwork systems with that higher data rate provided directly to eachdesktop.

Approval authority, standards, and guidance for the design,installation, and maintenance for protective distribution system areprovided by NSTISSI 7003 to U.S. government departments and agencies andtheir contractors.

The present invention uses a Protective Distribution System (PDS)solution that can provide Secure Physical Network SecurityInfrastructure Solution for Secure Passive Optical Network (SPON),Gigabit Passive Optical Network (GPON), and Fiber to the Desk (FTD) inIntrusion Detection of Optical Communication Systems (IDOCS)applications. The present invention can be customized to eachapplication. The disclosed method and apparatus provide an end to endsolution for Secure Passive Optical Networks (SPON), for Gigabit PassiveOptical Network (GPON), and Fiber to the Desk (FTTD) is provided forIntrusion Detection of Optical Communication Systems (IDOCS)applications. This method and apparatus improves the deployment,management and protection of defense critical networks and C4ISRFacilities where open storage areas become a challenge.

While allowing the customization of Intrusion Detection of OpticalCommunication Systems (IDOCS)), the present method and apparatus usesfiber optic data transfer which provides improved technology over copperdata transmission mechanisms where data protection is imperative anddata speed necessary.

An alarmed carrier protective distribution system provides a desirablealternative to conducting human visual inspections and may beconstructed to automate the inspection process through electronicmonitoring with an alarm system. In an alarmed carrier protectivedistribution system, the carrier system is “alarmed” with specializedoptical fibers deployed within the conduit for the purpose of sensingacoustic vibrations that usually occur when an intrusion is beingattempted on the conduit in order to gain access to the cables. But suchalarmed systems have been previously used only in main data transferconduits between buildings or within computer centers. The presentsystem significantly refines the application of the fiber optic alarmsand applies the alarmed lines to junction boxes and user lock boxes.

An alarmed carrier protective distribution system offers severaladvantages over hardened carrier protective distribution system,including (1) providing continuous monitoring, day and night, throughoutthe year; (2) eliminating the requirement for periodic visualinspections; (3) allowing the carrier to be placed above the ceiling orbelow the floor or in other difficult to access locations, since passivevisual inspections are not required; (4) eliminating the requirement forconcrete encasement outdoors; (5) eliminating the need to lock downmanhole covers; and (6) enabling rapid redeployment or modification forevolving network arrangements. While offering numerous advantages, suchsystems are expensive to install.

BRIEF SUMMARY

A protected distributed fiber optic network is provided that allows thetransmission of non-encrypted data to user terminals at 40 Gbps rateswhile meeting current government security requirements. The protecteddistribution fiber optic network has alarmed fiber optic lines in thecables connecting a secured junction box to each of a plurality ofsecured user lock boxes. An outgoing alarm line, a return alarm line anda data line in each cable connect the junction box to each user box. Theoutgoing alarm line is looped to the return alarm line of the same cableand looped inside the user lock box. The return alarm line is looped tothe outgoing alarm line of a different cable inside the junction boxwith repeated looping in the junction box and user box interconnecting aplurality of alarm lines passing through a plurality of user boxes. Adetector detects an alarm signal in the interconnected alarm lines totrigger an intrusion alarm.

An alarmed fiber optic distribution network and method is provided whichinclude fiber distribution panels and secure fiber optic secure junctionboxes. Fiber optic jumpers or loopbacks allow for the alarming orun-alarming of fiber optic lines, which lines may comprise secretInternet protocol router networks or non-secure Internet protocol routernetworks for classified or unclassified data transmission used inconjunction with a protective distribution systems. The protectivedistribution system may have interlocking armored fiber optic cableattaching to secure junction boxes and attaching to secure lock boxesthrough the use of locking connect sleeves that are affixed to theinterlocking armored fiber optic cables and also affixed to the boxes.The interlocking armored cable has the fiber optic lines inside theinterlocking armored conduit and such construction is known in the artand not described in detail herein. Such interlocking armored cable isconstructed to meet government security regulations suitable for use intransmitting secret data. Tampering with the cables containing thealarmed lines results in a signal transmission to a telecommunicationsroom or other detector, resulting in notice of the tampering, which inturn may lead to various actions depending on the nature of the securityand protocol for handling security threats or breaches.

A secure and alarmed protective fiber distribution system is providedthat includes locking fiber distribution cabinets in a securetelecommunications room. The telecommunications room advantageouslysupports an alarming system and an optional alarm patching system. Rackmounted fiber distribution panels located in the telecommunications roomconnect fiber optic cables to new or to existing networks, andpreferably provide the secure alarmed protective fiber distributionsystem. The interlocking armored fiber optic cable is run from thesecure telecommunications room to various locations as desired tosupport classified and un-classified networks with an alarm point forone or more selected users. The interlocking armored fiber optic cableis fitted with connectors. The cables are run to secure junction boxeswhich clamp to the connectors on the cable. These secure junction boxadvantageously, but optionally, are constructed to meet all U.S. AirForce AFI33-201V8 mandatory requirements for protective distributionsystems, and to meet any other applicable security requirements.

The fiber optic cables extending from the secure junction box(es) maycarry both the classified and un-classified lines in order to give theuser the ability to make the entire network classified or any selectedportions classified and alarmed or unclassified and not alarmed. Fromeach secure junction box interlocking armored fiber optic cables extendto network users locations, with the cables having connectors that areclamped to a secure classified secure lock box. Depending on the type ofnetwork the secure lock box meets all U.S. Air Force AFI33-201V8mandatory requirements for protective distribution systems or such othersecurity requirements as are applicable. Depending on the type ofnetwork (i.e. passive optical network or Fiber to the Desk top fiber tothe desk), a user device may be installed inside the secure lock box.

Two cores or lines in the interlocking armored fiber optic cable areused for alarming the various selected boxes and networks or selectedportions of networks. Inside the secure junction box fiber jumpers areinstalled to provide an alarmed fiber optic line from the user fiberdistribution panel to the alarm fiber distribution panel inside thetelecommunications room so that the selected user terminals or selectednetworks are is connected to the alarming system. Within the securejunction box the alarming core or line will loop back the alarm signalto extend the signal to the selected user lock boxes or selectednetworks. The alarming core or line is not provided for non-securedlines or users or networks.

A protective system and method are disclosed that include fiberdistribution panels and secure fiber optic secure junction boxes withthe optional use of fiber optic jumpers or loopbacks to allow for thealarming or un-alarming of secret Internet protocol router networks ornon-secure Internet protocol router networks to accommodate classifiedor unclassified data transmission when used in conjunction with aprotective distribution system. The protective distribution system haspre-terminated interlocking armored fiber optic cable(s) attaching tosecure junction boxes to secure lock boxes with the use of lockingconnect sleeves that are affixed to the interlocking armored fiber opticcable with epoxy.

The secure junction boxes and secure lock boxes include steel boxes withhidden hinge systems to avoid mechanical, in-line access to hinges. Theboxes may have seams that are welded and ground to further inhibitaccess at the seams. A cable clamping system is preferably installed toaccommodate the cable connect locking sleeves that are affixed to eachcable. The cable clamp system may allow for per-terminated,pre-connectorized fiber optic interlocking armored cables to beinstalled in the box and held such that removal of an optical cable fromthe box is inhibited and that any such removal will result in visuallyperceptible damage. A Government Service Agency approved padlock may beused on each secure box for locking and inspection.

There is also provided a factory-manufactured, pre-terminated andpre-connectorized, fiber optic interlocking armored fiber optic cablehaving at least one pre-terminated and pre-connectorized access locationfor providing access to at least one pre-terminated andpre-connectorized interlocking armored fiber optic cable connector.

Depending on the application for either passive optical network or fiberto the desk topology, a simplex or duplex fiber may be used for the datatransmission. In both topologies, duplex fiber may be used for alarming.In order to maximize the use of the alarming ports, loopback connectorsare used in the telecommunications room and/or within the securejunction box in order to extend the duplex alarming fiber to each secretInternet protocol router network user. An additional loopback may beinstalled within the user secure lockbox to return the alarming loop tothe telecommunications room or secure junction box. During theinstallation the dB signal loss for distances and connections need to beconsidered and accommodated using known techniques to compensate forsignal loss.

The present invention uses Intrusion Detection of Optical CommunicationSystems (IDOCS) and is especially useful in areas of a protectivedistribution system that cannot be visually monitored but still requireprotection at all times. Such an intrusion detection system requiresminimal cost to install and operate when considering the rising costs ofinstalling and maintaining a data encryption system, and the costs ofother alternative protection systems. The benefit of using intrusiondetection of optical communication systems over other alarmed carriertechnology is that it monitors the same fiber or cable that requiredprotection. Further, its COMSEC-specific development negates the falsealarm issue that would result from the technology transfer oftraditional fence line systems.

The Secure Passive Optical Network (SPON) solution of the presentinvention is based on the International TelecommunicationsUnion-compliant Gigabit Passive Optical Network (GPON) technology. Thissolution provides connectivity for one or more of voice, data, video,and secure and non-secure local area networks, secure passive opticalnetwork seamlessly integrates analog and digital video, broadband data,and telephone services onto a common platform. It also provides a Layer2 passive optical distribution system to end users. An Optical LineTerminal (OLT) at the data center provides the interconnection to thesecure passive optical network system. Single mode fiber is then used tocarry the optical signal to an Optical Network Terminal (ONT) at theuser station that provides an intelligent managed demarcation point fornetwork services.

The present invention advantageously uses Gigabit Passive OpticalNetworks (GPON) to provide a capacity boost in both the total bandwidthand bandwidth efficiency through the use of larger, variable-lengthpackets in passive optical network technology. The gigabit passiveoptical network is standardized by the requirements of ITU-T G.984(GPON). While those requirements permit several choices of bit rate, theindustry has converged on 2.488 Gbps of downstream bandwidth, and 1.244Gbps of upstream bandwidth. A Gigabit passive optical networkEncapsulation Method (GEM) allows very efficient packaging of usertraffic, with frame segmentation to allow for higher quality of service(QoS) for delay-sensitive traffic such as voice and videocommunications.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other advantages of the invention will be better understood inview of the following drawings and description, in which like numbersrefer to like parts throughout, and in which:

FIG. 1 shows an armored and alarmed protective distribution systemapplied to an exemplary telecommunication room;

FIG. 2 shows a pre-terminated interlocking jumper configuration;

FIG. 3 is a top plan view of a secure cable junction box;

FIG. 4 is a top plan view of a secure user lock box cable configuration;

FIG. 5 is a perspective view of a secure cable junction box as partiallyshown in FIG. 3 but without the fiber optic lines;

FIG. 6 shows a top perspective view of a secure cable lock box alsoshown in FIG. 4 but without the fiber optic cable connected;

FIG. 7 is a perspective view of the user lock box of FIGS. 4 and 6;

FIG. 8 shows a top perspective view of a cable connect locking sleeve;

FIG. 9 shows a side perspective view of an alternative embodiment of acable connect locking sleeve; and

FIG. 10 shows a schematic layout of a communications room and a fiberoptic cable distribution system having secured and non-secured lines.

DETAILED DESCRIPTION

Referring to FIG. 10, a fiber optic distribution system 10 is shown thatincludes fiber distribution panels 12 preferably, but optionally locatedin a telecommunications center. The panel(s) 12 in thetelecommunications center receive one or more fiber optic cables 16bearing signals and routes various fiber optic cables 26 from the panel12 to various locations schematically illustrated in FIG. 10 throughvarious secured boxes 14, 18 and fiber optic cables 58, 59, to end usercomputer terminals 19. The routed data through cables 26 may come fromother sources and need not be solely signals received from fiber opticcables 16.

The telecommunications room provides alarm sensors or detector 11 fordetecting tampering or unauthorized access to selected cores or lines inany of a plurality of fiber optic cables 26. The detector 11 activatesone or more of various signals 13, including audio signals, visualsignals, or laser communication signals or telecommunication signals orelectronic signals in response to appropriate signals or lack of signalsfrom the selected alarmed cores or lines within cable(s) 26. The alarmedlines are discussed in more detail below.

The fiber optic cables 26 are advantageously routed from the panel 12 toone or more secure fiber optic junction boxes 14 which in turn routefiber optic cables 26 through further fiber optic lines (e.g., 58, 59)to one or more user lock boxes 18 connected to user computer terminals19. If desired, the cables 26 may go directly from thetelecommunications room to the user lock box 18. The junction boxes 14may use fiber optic jumpers or loopbacks to allow for the alarming orun-alarming of secret Internet protocol router networks or non-secureInternet protocol router networks for classified or unclassified datatransmission when used in conjunction with a protective distributionsystems 10. The protective distribution system 10 uses interlockingarmored fiber optic cables 26 attaching secure junction boxes 14 tosecure lock boxes 18 with the use of locking connect sleeves (FIGS. 8-9)that are affixed to the interlocking armored fiber optic cable 26 andthe junction boxes 14. If a selected fiber optic line or core is to besecured, then as discussed later, cable 26 carrying that line has twoadditional alarm lines, one line carrying an alarm signal to one or moreselected locations and one line returning an alarm signal from the oneor more selected locations. Jumpers may loop back the alarming line to aselected plurality of locations and before connecting to the returnalarm line thus forming a loop of interconnected alarm lines that end upback at detector 11 so that interference or tampering with the cables 26or boxes 14, 18 results in an alarm detection by detector 11.

A fiber optic cable 26 experiences a signal loss that varies with thelength of the cable and any bends in the cable. But signal loss is alsocaused by touching the cable, moving the cable and changing the lightexposure of the cable. The fiber optic cables are sufficiently sensitiveto changing conditions and physical contact that the cables experience asignal loss from acoustical vibrations. Thus, a person cutting theprotective shielding around a fiber optic cable 26 to access the cablewill cause a signal loss. Because light can travel very fast around aloop of fiber optic cable, any contact with a cable or movement of thecable or vibrations on the cable may be detected fast, and the locationof the movement, contact, handling, etc. may be located along the lengthof the cable. The present invention thus uses pairs of fiber optic linesinside fiber optic cables 26 to alarm the cables and detect intrusionsor attempts at intrusion. The detector 11 sends a signal through a fiberoptic line and monitors the return signal to detect changes in thesignal strength that reflect intrusions or cable movement, and thatidentifies the location of the intrusion along the fiber optic cable.Various detectors 11 may be used, with a detector named the Interceptorand sold by Network Integrity Systems in Hickory, N.C., believedsuitable for use.

The cables 26 are preferably pre-terminated (i.e., connectors areattached by the manufacturer) where possible, and are advantageouslyarmored by placing the cables inside a suitable carrier such as aninterlocking armored cable, Electrical Metal Tubing (EMT), PVC pipe, orother suitable conduits meeting the security requirements of theparticular application. Enclosing the fiber optic cables 26 in sucharmored conduits increases the sensitivity of the alarming lines becauseof the physical force needed to breach the conduits and reach the fiberoptic lines, and because even the change in ambient light from a hole inthe cable may be detected.

Referring to FIGS. 1-3, 5, 7 and 10, the cable 26 takes the form of oneor more data feeds 26 from the telecommunications room which feed datato a secure junction box 14. For illustration, data cable 26 a is aclassified secret Internet protocol router network data and data cablefeed 26 b is an unclassified feed. The data feeds 26 are secured fiberoptic cables. The junction boxes advantageously conform to U.S. AirForce AFI33-201V8 or other applicable specifications or regulations. Thesecure junction box 14 is configured to limit access to only authorizedpersonnel, via use of various locking devices including keyed locks,padlocks, or electronic locks which may be unlocked by the authorizedpersonnel. The junction boxes 14 are usually metal with no access otherthan through locked access doors, lids or panels with access controlledby the locking devices. Attempts at unauthorized entry to the junctionbox 14 will leave visual indications, or if electronically locked, theelectronics may track time, date and personnel accessing the junctionboxes 14 or may track attempts to access the junction box. Variouselectronic motion sensors or force sensors may be used to detect suchattempts at access.

The data feed 26 a may contain a plurality of lines that may transferdata of differing security levels, with each data transfer linereceiving differing security protections. For illustration, feed line 26a includes secure data lines 27 a, 27-b and secret data lines 28 a, 28b, 28 c, 28 d (FIG. 2) while unsecured feed line 26 b includesnon-secret and non-secure data lines 29 a through 29 f (FIG. 2).

Each of the data lines 26 a, 26 b etc. is separately connected to afiber optic patch panel 12 that is preferably rack mounted to allowmultiple panel support and many connections. The fiber optic patch panel12 connects the secure lines 26 to a fiber-to-the-premises (FTTP)network using passive optical network (PON) components. The patch panel12 is advantageously located within or forms a wall of a secured box orfacility so that access to the data lines 27, 28 and 29 are limited andrequire access through a tamper evident junction box. Thus, the rackmount fiber patch panel 12 connects data feeds 26 to the new or existingoptical line terminal or fiber to the desk network and could also beused for alarm patching. Both classified secret Internet protocol routernetworks 26 a and un-classified non-secure Internet protocol routernetwork 26 are connected to the rack mount fiber patch panel 12.

Fiber optic lines 26, 27 are alarmed fiber jumper lines configured toalarm a user lock box 18. From the junction panel 12, the data feeds 26are routed to various junction boxes throughout a floor in a buildingand then routed to users on that floor. If desired, the alarming of thesecure data feeds 26 from the distribution panel 12 may be the same asthe alarming of the junction box described below. Preferably, the patchpanel 12 forms a back wall of a panel junction box 14 and the datafeed(s) 26 may be fastened to the back wall in a way that forms asecure, tamper resistant and tamper evident connection with the junctionbox.

The alarming devise (in lines 27) is also connected to the rack mountfiber patch panel 12 and could be jumper connected to any securejunction box 14. The cables 26 may be pre-terminated (i.e., connectorsare attached by the manufacturer) and have interlocking armored fiberjumper cable (FIG. 2) to connect from the telecommunications room fiberpatch panel 12. Color coded fiber optic connectors may be used to assignthe type of connectivity.

Referring to FIG. 2, cable connector locking sleeves 32 are preferablyaffixed to the armored cable outer jacket. The locking sleeves 32connect securely to the secure junction boxes 18 (FIG. 3) as describedlater. The connectors 32 have tubular portions that fit over the armoredcable outer jacket and may be affixed annularly with suitable adhesiveor epoxy. A strip of adhesive heat shrink tubing 34 may overlay thecable connector locking sleeve to further secure it to the cable outerjacket. A one inch length of tubing (shrunk) 34 is believed suitable andprovides a tamper evident covering and connection.

The data feeds 26 a, 26 b may contain any number of fiber optic feeds,some of which are classified (27) or secure (28) or unclassified (29),with the appropriate level of fiber optic line being physically routedto the appropriate user terminal. The fiber optic lines are preferablycolor coded, with black fiber optic lines or connectors indicatingalarming feed for patching classified users, with red fiber opticconnectors indicating classified secret Internet protocol router networkfeed for patching classified users and with green indicatingun-classified non-secure Internet protocol router network feed from thetelecommunications room. Appropriate fiber optic connectors 37 a-b, 38 ato 38 d and 39 a to 39 f on data lines 27 a-b, 28 a to 28 b, and 29 a to29 f, respectively, provide for connection with other fiber optic lines.The connectors 37, 38, 39 may be color coded as desired, preferablymatching the wire colors, with red or black reflecting classified dataline connectors and green reflecting non-classified data lineconnectors.

Referring to FIGS. 3 and 5, the fiber optic data feeds 26 have datalines 27, 28, 29 that are physically routed to appropriate outlet linesconnecting to user lock boxes 18. For simplicity, only two data feeds 26a, 26 b are shown with a limited number of data lines. But any number ofthe various feed lines 26 and data transfer and alarmed lines 27, 29, 29may be used.

The junction box 14 may have various shapes, and is shown with arectangular shape having six (preferably flat) sides, with the datainput feed lines 26 connected to a first end panel 42 and data outputfiber optic data transfer cables 58, 59 on opposing end panel 44, withconnectors 32 held in mating restraints or recesses 50 (FIG. 5) in theend panel 44 as described later. The end panels 42, 44 are held apart bya bottom 46 and a top 48, with side walls 49 a, 49 b. The top, bottom,ends and sides of the junction box 14 are preferably made with a maximumthickness of 12 gauge steel and a minimum thickness of 16 gauge steel.The top 48 is preferably hinged internally at hinge 52 (FIG. 5) to forma lid that may be opened to allow access to the inside of junction box14. The hinges 52 are located inside the box 14 so that the hinge is notexternally accessible. The top 48 preferably has a depending flange orlip 54 around its edges. Channels 56 are located around the upper edgesof the ends 42, 44 and the two sides 49 a, 49 b with the channels 56having a U-shaped cross section and oriented to receive the flange 54 onthe top or lid 48. The interlocking or mating lip 54 and channels 56block straight line access to the interior of the junction box 14 sothat a screwdriver or pry bar cannot be inserted beneath the top 48 topry it open. The construction provides no mechanical, in-line access tothe hinges once the box is locked. Advantageously, the secure junctionbox 18 has no gap larger than 0.06 inches in any of the interfacebetween the main box and any associated mating components, e.g. hingedtop 48, access panels, etc.

A locking mechanism preferably releasably holds the top 48 to theremainder of the junction box 14. Electronic locks, keyed locks, orpadlocks can be used to connect the hinged top 48 to the remainder ofthe junction box 14. A two-part hasp 55 a, 55 b, each having an openingthrough which a padlock shank (not shown) can be inserted is shown torepresent a typical locking mechanism. Any padlock is preferably a GSAauthorized padlock. The hinges 52 are preferably mounted to an outeredge of the channel extending along sidewall 49 b to conceal the hinges52 inside the junction box 14 and shield the hinges from external accessoutside the junction box 14.

The fiber optic lines 27, 28, 29 are routed through the junction box 14around various fiber optic guides 60 to the appropriate correspondingoutlet connector 50, and corresponding outgoing lines 57, 58, 59,respectively. The fiber optic guides 60 may take various forms, but areshown as cylindrical hubs 62 having a bottom or first end fastened tothe bottom 46 of the junction box 14, and an upper end or second endforming projections 62 extending outward from the hub. The curved shapeof the hubs 62 is selected to be large enough to not damage the fiberoptic cables as the fiber optic lines 27, 28, 29 are wound around thecable guides 60 to arrange the lines to appropriate outlet connector 50.The projections 62 keep the fiber optic cables from sliding up and offthe curved hubs 62.

Supporting frames 66 are optionally fastened to the bottom 46 and/orside walls 49 a, 49 b to restrain the top 48 from being pushed inwardtoward the hubs 60, and to restrain any fiber optic cables or linesinside the junction box 14. The frames 66 are preferably made of angledchannel members to allow easy threading of the fiber optic lines aroundthe various cable guides 60 and to allow increased strength and easyfastening to the bottom 46 and sidewalls 49. The frames 66 can also beused for routing of the fiber optic cables within the junction box 14 byallowing cable bundles to be tied to various portions of the frame tosupport the cables and control cable location and/or cable movement.

The fiber optic lines 27, 28 and 29 are threaded around one or more ofthe cable guides 60 so the lines connect to the appropriate outgoingline connector 50. The lines are preferably color coded or otherwiselabeled to make tracking and checking easier. Advantageously, blackfiber optic connectors represent transmitting alarming feed for patchingclassified users, red jacketed lines 28 a, 28 b, 28 c and connectorsindicate classified secret Internet protocol router network data feedfrom the telecommunications room and green fiber optic connectors andlines 29 a through 29 d represent transmitting data feed for patchingun-classified users with in junction box 14.

Referring to FIG. 3, a single alarmed line 70 may be used to alarm aplurality of the selected data transfer lines 28, 29 within the junctionbox 14. Alarm line 70 comes from data feed line 26, accompanies one ormore of the data lines 28 a, 28 b, 28 c exiting the junction box 14 tocommunicate with user lock box 18 (FIGS. 4, 6 & 10) and then loops backto the junction box 14 before returning a signal back through data feedline 26. In more detail, data feed line 26 (e.g., from thetelecommunications room) and secret data transfer lines 28 a, 28 b, 28 cand non-secure data transfer lines 29 a through 29 d. But the alarm line70 is looped so it goes along with and returns from each user line 58 a,58 b and 58 c to the associated user lock box 18. Specifically, the datatransfer lines 28 a, 28 b and 28 c are routed to the outlet connectors50 for corresponding user lines 58 a, 58 b, and 58 c, respectively.Alarm line 70 (identified as 70 aout) passes through cable or line 58 aalong with line 28 a and returns through cable 58 a as line 70 areturn.Line 70 areturn is looped and accompanies line 28 b as line 70 bout andreturns through cable 58 b as line 70 breturn. Line 70 breturn is loopedand accompanies line 28 c as line 70 cout and returns through cable 58 cas line 70 creturn. The looping can be repeated as many times as needed.The final return alarm line (here, 70 creturn) returns its signalthrough data transfer cable or line 26 to the telecommunications officewhere the signal is monitored.

If the data transmission is interrupted, as by data tampering, theft,damage or other actions affecting the data transmission through thefiber optic cable, the interruption is detected at thetelecommunications office by detector 11, which preferably both sends asignal through the outgoing alarm line and receives a signal from thereturn line in order to identify variations in the signal strengthreflecting intrusions, intrusion attempts, and the location of suchintrusions or attempts along the length of the alarm lines. Thisdetection assumes that the data transmission of one line in a cablecannot be intercepted without disrupting the signal in the accompanyingalarmed lines in the same cable.

Data transfer lines 29 a through 29 d are routed through junction box 14and hubs 60 to the corresponding connectors 50 for corresponding userlines 59 a, 59 b, 59 c and 59 d. Since these lines are unsecured and notalarmed, the alarm line 70 does not accompany these data transfer lines.By removing the top 48, the fiber optic connections to any specific enduser or user lock box 18 can be altered to add or remove alarmed linesby looping the alarmed line 70 around the desired line going to theselected user lock box 18, or by removing the looped alarmed line fromuser lock box that need no longer be secured. The cables 26 connectingthe junction box 14 with the user lock box 18 can be re-routed for eachuser lock box 18 as needed, or the alarm lines 70 can be placed in theinitial cables 26 and just connected or disconnected in the junction box14 as needed to form alarmed or non-alarmed lines.

Referring to FIGS. 4, 6 and 7, the user lock box 18 is described in moredetail. Physically, the user lock box 18 can have various shapes andconstructions. Advantageously, the user lock box 18 meets all U.S. Airforce AFI33-201V8 mandatory requirements for protective distributionsystems (PDS) or any other regulatory or security requirements imposedby other organizations or imposed in the future. As shown in thefigures, the box 18 has a rectangular box having a top 80, an opposingbottom 82 joined by opposing sidewalls 84 a, and 84 b. Input end panel86 covers one end and opposing output end panel 88 covers the other endof the user lock box 18. Vents 90 are advantageously formed in sidewalls84 and top 80, with the vents being small enough to inhibit tamperingand access for data theft, but large enough and numerous enough to allowair flow for cooling. The top, bottom, ends and sidewalls form anenclosed, sealed container which cannot be accessed withoutauthorization, or by physically damaging part of the lock box andleaving visual evidence of that damage. The various walls, sides andbottom are typically welded with ground seams, made of bent metal joinedinternal the box 18, or made with nesting joints as in the lid 48 ofjunction box 14. On junction box 14, any non-removable sides, walls,top, bottom etc. are also preferably welded with ground seams. On bothboxes 14, 18, there are preferably no screw access points on any of thevisible sides, ends or surfaces, although flush screw mounts on bottomsurface that mates to the floor are sometimes used.

Functionally, the input end 86 has at least one connector for receivinga cable 26 from junction box 14. Output end 88 has at least one outputconnector 92 for data communication with a user device such as acomputer (not shown) or for connection to a fiber optical network. FIG.7 shows a plurality of network patch cords (CAT5E, 6, 7) as comprisingthe output connectors 92. The user lock box has appropriate internalapparatus to provide fiber optic communication with the desired outputconnections 92. FIG. 4 shows a connection with only one of four outputs92, but appropriate routers and cable dividers can be provided to placeany of the outputs 92 in signal communication with the cable 26. FIG. 6shows internal part 100, which is an appropriate device to provide atleast fiber to desk (FTTD) or fiber to optical network terminal (ONT orPON) signal connection to the outputs 92 through network patch cords 99and network couplers 101.

The routing of non-secured data transfer lines 29 are similar to therouting of alarmed line 28 a, except no alarm lines 70 aout or 70areturn accompany the non-secured data transfer lines 29. Thenon-secured data transfer lines 29 may pass through a user lock box 18,or not, with the fiber optic cables 59 connecting directly to thedesired desk or optical network as desired.

The output connectors 92 are physically shielded by pivoted cover 94which rotate on hinges 96 extending from or between sidewalls 84 andconnected to the upper edge of cover 94. The cover 94 is shown as beingsized to cover the four outlets 92 and to cover the outlet end 88. Thecover 94 has an end 98 forming a U-shape in cross-section, with thehinge 96 located in this U-shaped channel. The U-shaped channel limitsexternal access to the hinges 96. The lock box 14 is configured to limitaccess to only authorized personnel, via use of various locking devicesincluding keyed locks, padlocks, or electronic locks which may beunlocked by the authorized personnel. As with the junction box 14, atwo-part hasp 55 a, 55 b each part respectively connected to a differentone of the cover 94 and lock box 18 is used with a padlock (not shown)to represent the locking mechanism. Any padlock is preferably a GSAauthorized padlock. The locking mechanism and removable or rotatingcover 94 limits access to the end of the fiber optic line and dataconnection.

Referring to FIG. 4, input fiber optic 26 (FIG. 10) is connected tojunction box 14 and may comprise any one of cables 58 a, 58 b, and 58 c.For simplicity it will be described as cable 58 a, carrying datatransmission lines 28 a and alarm lines 70 aout and 70 areturn, and thedescription of analogous lock boxes 14 for alarmed cables 58 b, 58 c arenot give. Data transmission line 28 a is placed in signal communicationwith one or more of output connectors 92 as described above. Alarm line70 aout accompanies line 28 a through a portion of the user lock box 18and detects tampering with the accompanied line 28 a. Preferably, one orboth of alarm lines 70 aout or 70 areturn accompany the data line 28 auntil the data line enters the electronic module 100 which providesfiber to desk (FTTD) or fiber to optical network terminal (ONT or PON)signal connection to the outputs 92. The alarm line 70 aout passesthrough a loopback 102 that passes the alarm line 70 aout back towardjunction box 14 and back through cable 58 a. After the loopback 102, thealarm line 70 aout becomes alarm line 70 areturn as it returns to thejunction box 14 through the cable 58 a. Tampering with the data transferline 28 a affects alarm lines 70 aout and/or 70 areturn, thustransmitting an alarm signal though cable 58 a.

The loopback 102 may be located around an L-shaped bracket 103 (FIG. 6)having the short leg of the L fastened to the bottom 82 of the user lockbox 18, with the long leg of the L extending from the bottom and havinga width sufficient for the fiber optic line to bend around that leg ofthe bracket 103 without damaging the fiber optic line. Optionally, thefiber optic line may be fastened to the b racket 103.

Thus, the alarmed fiber 28/70 will loopback to the junction box 18 (FIG.3), then loopback again to the next classified secret Internet protocolrouter network users within the network through a different user lockbox 18, as illustrated in FIGS. 3 and 4. The classified secret Internetprotocol router network fiber 28 a will be connected the user devicethrough a fiber to the desk (FTTD) or optical network terminal (ONT),depending on the network topology.

Referring to FIG. 8, the connector used in FIGS. 4-6 of cable 58 a (andcables 26, 26, 59) to the lock box 18 and junction box 14 is shown. Thelocking sleeve connector 32 has a tubular or annular shank 110 sized tosnugly fit over the outside of the shielded cable 26, 26, 58, 59 and isfastened to that cable by suitable adhesive, clamping, or otherfastening mechanism. The tubular shank 110 extends from a mountingportion 112 having a through hole coaxial with the axis of the tubularshank 110 so the cable can pass through the entire connector 32. Themounting portion has two parallel flanges 114 a, 114 b spaced apart adistance that preferably corresponds to the thickness of the wall ofjunction box 14 or user box 18 or mounting bracket to which theconnector 32 is to be fastened. The mounting portion 112 has a square orrectangular shape between the flanges 114. The flanges 114 are on atleast the opposing upper and lower edges of the connector 32 using theorientation seen in FIG. 8.

Depending on the user classification type either red fiber opticconnectors indicate classified secret Internet protocol router networkusers 3D and green fiber optic connectors are used to indicateun-classified Non-secure Internet protocol router network users 3C.Black fiber optic connectors are to be used for alarming feed forpatching 3A. All of the patches will be terminated to the multi-platesmounted 5B within the junction box FIG. 5. These patches will also beuser to activate or deactivate the data signal from the network for anyuser box FIG. 6. Thus, for un-classified non-secure Internet protocolrouter network users the fiber optic lines 29 may run directly to theuser device, such as a fiber to the desk (FTTD) or optical networkterminal (OTN), depending on the network topology. Classified secretInternet protocol router network users the will have lines 28 that arepatched along with an alarmed fiber 70 to the secure user box 18,preferably using pre-terminated interlocking armored fiber jumper cablesas generally illustrated in FIG. 2. Using a cable connector 32 allowsthe cable 26, 26, 58, 59 to connect securely to the secure junctionboxes 14 and to the secure user box 18.

Referring to FIG. 11, in use, a mounting bracket 115 is attached to theappropriate wall of the junction box 14 or user box 18, surrounding atleast a portion of the opening through which the cable 26, 26, 58, or 59is to pass. The mounting bracket 115 has a U-shaped cross-section orforms a U-shaped cross-section with the wall of the box 14, 18. A lowerrestraint 126 is placed in the bracket slightly below the openingthrough which the cable 26, 26, 58, or 59 is to pass so that the bracket115 stops the restraint 126 from moving away from the bracket, andeither the bracket or the wall of the box 14, 18 stops the restraintfrom moving toward or past the wall. The cable and attached connector 32are placed through the opening in the box 14, 18 so that the lowerrestraint is between the flanges 114 of the connector 32. An upperrestraint 118 is then placed in the bracket 115 and into the spacebetween flanges 114 of the connector 32, with the restraint 118 beinglimited in motion by the bracket 112 and wall of box 14, 18. The upperand lower restraints 126, 118 enclose the connector 32 and cooperatewith the flanges 114 to limit movement of the connector relative to therestraints and the wall of the box 14, 18 to which the restraints areconnected (through bracket 112. The flanges 114 prevent movement ofconnector 32 and the cable 26, 26, 58, 59 to which the connector isfastened. If needed, the lower and upper restraints can be held togetherby clips, screws, adhesives or other fasteners.

The flanges 114 on connector 32 can be on any opposing edges of theconnector 32, top and bottom, or opposing sides, or on all four edges ofthe connector. The restraints 126, 118 are shaped and located to engagethe flanges to restrain motion of the connector, and may extendhorizontally, vertically, or at inclined angles so that the restraintsfor connector 32 are not limited to the specific embodiment illustrated.Since the connector 32 is fastened to the cable 26, 26, 58, 59 the cablecannot be removed from the box 14, 18 without damaging the cable, theconnector 32, or the restraints 126, 118—thus leaving visual damage oftampering. The connectors 32 thus allow the cables to be connected tothe boxes 14, 18 and secured from movement. The bracket 115 andrestraints 116, 118 form a clamping mechanism or system to hold theconnectors 32 and cables in position. But the specific structure can bevaried, with the restraints taking differing forms as long as theyengage the connectors to restrain movement relative to the box 14, 18 towhich the connectors are ultimately fastened. Because the cable extendsthrough a preformed opening in the connector 32, the connector does notput pressure on cable or cable jacket. Moreover, because the restraints116, 118 and bracket 115 do not abut the cable, the cables are held withno physical compression on the cables by the connection with the boxes14, 18. Still further, the restraints 116, 118 need not compress eventhe connector 32, further reducing the likelihood of squeezing the fiberoptic cable 16, 26, 57, 58 fastened to and held by the connector 32.Additionally, the connectors 32 and their connection to the boxes 14, 18eliminate visual and/or mechanical access to the inside of the box 14,18 along the path where the cables interface with the connectors andclamping system.

Referring to FIG. 9, another configuration for connector 32 is shown inwhich the flanges are circular in shape rather than rectangular as inFIG. 8. Further, in the embodiment of FIG. 9, the mounting portion 112between the flanges 114 has a generally cylindrical portion extendingbetween the flanges 114, and a three sided, trapezoidal shape for theremainder of the shape. In both FIGS. 8 and 9, the non-circular shape ofthe mounting portion 112 cooperates with mating recesses in the upperand lower restraints 126, 118 to prevent rotation of the coupler 32 andthus inhibit removal of the connector 32 from the boxes 14, 18. Theflanges 114 and shaped mounting portion 112 also help hold theconnectors 32 and the associated cable 26, 26, 58, 59 in position duringinstallation, making it easier to lock the connectors in place relativeto the boxes 14, 18 in which the connectors 32 and associated cables areinstalled. Other shapes for the mounting portion could be used, but themounting portion 112 between flanges 112 preferably has at least oneflat side.

A cable 16, 26, 58, 59 with a connector 32 is believed to be new and toprovide useful advantages as described herein. The fiber optical cables16, 26, 58, 59 are preferably constructed using single mode fiber cores.The cables advantageously have a jacketing material made of aluminuminterlocked armored material. Advantageously, the cables have one of theconnectors 32 on adjacent each opposing end of the cable, with theoffset from the adjacent cable end depending on how much cable is neededfor routing within junction box 14, or user lock box 18, or distributionpanel 12. Typically, the connectors 32 are located from a few inches toa few feet from the end, and in some instances each connector 32 is arewithin about 12 inches from the adjacent end of the cable.Advantageously, the connectors are affixed to the cable with epoxy orother suitable adhesive. Preferably, heat shrink tubing is placed overthe epoxied connection and over the annular shank 110 and part of thecable to which the connector 32 is fastened, and then the tubing isshrunk.

The various cable connectors used in this fiber optic system and inpanel 12 or boxes 14, 18 are advantageously SC single mode AngledPhysical Contact (APC) polished connectors. The pre-terminated jumpersare preferably 100% lab tested with DB loss test results provided forverification. Further, the jumpers are preferably 4 core pre-terminatedand interlocked armored jumpers.

Referring again to FIG. 10, the fiber optic lines 26, 57, 58 haveopposing first and second ends extending from, between or throughvarious ones of the boxes 14, 18 and distribution panels 12. Thejunction boxes 14 are typically the first boxes when the distributionsystem is viewed along the line of the data flowing through the fiberoptic cables and lines within those cables. The user lock boxes 18 areusually the second boxes when the distribution system is viewed alongthe line of the data flowing through the fiber optic cables and lineswithin those cables. When the distribution system is viewed in thereverse direction, from the user lock box 18, then the user box is thefirst box and the junction box 14 is the second box, with thetelecommunications room potentially containing further distributionboxes.

The interlocking armored fiber optic cables with the alarming lines andloopback features for each secured user allow the transmission ofnon-encrypted data to user terminals at 40 Gbps rates while meetingcurrent government security requirements. As the capacity of fiber opticcables to carry data increases, the data transfer rate will alsoincrease. This provides a significant improvement over the ability tocarry data over copper or other metal lines, while providing thesecurity needed for classified and other secured data transmission.Further, the ability to secure the fiber optic transmission lineswithout encryption significantly simplifies the system and increases thedata transfer rate and the actual speed with which data may be accessedand used by the computers 19 associated with each user lock box.

The above description is given by way of example, and not limitation.Given the above disclosure, one skilled in the art could devisevariations that are within the scope and spirit of the inventiondisclosed herein, including various ways of routing the alarm lines 70along with the data transfer line 28 that is to be protected againstintrusion. Further, the various features of the embodiments disclosedherein can be used alone, or in varying combinations with each other andare not intended to be limited to the specific combination describedherein. Thus, the scope of the claims is not to be limited by theillustrated embodiments.

1. A protective distribution system with alarmed, interlocking armoredfiber optic cables, comprising: a distribution panel in a securedlocation, at least a first interlocking armored fiber optic cableconnected to the distribution and carrying a fiber optic outgoing alarmline and fiber optic return alarm line to transmit alarm signals, andleast one data line that is not connected to encryption devices orsoftware and transmitting data that is not encrypted; a secured junctionbox connected to the first fiber optic cable and having a plurality ofinterlocking armored, outgoing fiber optic cables each connected to thejunction box at one end of each cable and connected to a differentsecured user lock box at the other end of the each cable so as totransmit data through the outgoing fiber optic cables; at least aselected group of the plurality of outgoing fiber optic cables eachhaving a fiber optic data transfer line transmitting the non-encrypteddata, and in addition the fiber optic outgoing alarm line and fiberoptic return alarm line to transmit alarm signals, the selected groupcontaining at least a first cable with a first outgoing alarm line and afirst return alarm line and a last cable having a last outgoing alarmline and a last return alarm line; a jumper in each user lock box thatis connected to the selected group of fiber optic cables, the jumperlooping the outgoing alarm line to the return alarm line containedwithin the same cable connected to that user lock box so an alarm signalcan pass from the outgoing line to the return line; at least one jumperin the secured junction box connecting the return alarm line of thefirst cable within the selected group to the outgoing alarm line ofanother cable within the selected group to form a continuous fiber opticpath of connected alarm lines through the secured user boxes associatedwith the first cable and said another cable until the last return alarmline is in fiber optic communication with the first outgoing alarm line;and a detector in communication with the least the return alarm linewhich is in fiber optic communication with the return alarm line at thedistribution panel, the detector configured to detect an alarm signal inthe continuous fiber optic path of connected alarm lines.
 2. The systemof claim 1, wherein the secured user lock box contains at least one ofan outgoing alarm line and a return alarm line that encircles asubstantial portion of the user lock box.
 3. The system of claim 1,wherein the secured user lock box is connected to a passive opticalnetwork.
 4. The system of claim 1, further including a further pluralityof cables in the selected group of cables which further plurality ofcables pass through a wall of the junction box and also pass through awall of the user lock box, comprising: at least one connector adhered toeach cable in the further plurality of cables and adhered at thelocation where each cable passes through the wall of the junction box orthe wall of the user lock box and connected to the wall at thatlocation, each connector having a hole through which the cable to whichthe connector is adhered passes, each connector having two spaced apartand parallel flanges on at least two sides of the connector with aportion of each wall or a restraining portion connected to each wallfitting between the flanges of the connector to restrain movement of theconnector along a length of the cable at the location of the connector.5. The system of claim 1, wherein the alarm detector and control panelare in a telecommunications room.
 6. The system of claim 1, wherein thesecure junction box and secure user lock box meet all U.S. Air ForceAFI33-201V8 mandatory requirements for protective distribution systems.7. The system of claim 1, wherein the distribution panel, junction boxand all of the secured user lock boxes are on the same floor of abuilding.
 8. A fiber optic cable comprising: an interlocking armoredfiber optic cable having opposing ends with a connector adjacent eachend, each connector having a cylindrical hole through which theinterlocking armored cable passes with the connector being adhered tothe cable at the cylindrical hole, each connector having two spacedapart and parallel flanges extending outward from the connector on atleast two opposing sides of the connector.
 9. The fiber optic cable ofclaim 8, wherein the portion of the connector between the flanges has atleast two flat sides.
 10. The fiber optic cable of claim 8, wherein theportion of the connector between the flanges has at square crosssectional, exterior shape.
 11. The fiber optic cable of claim 8, whereinthe portion of the connector between the flanges has at least two flatexterior sides and further has a curved exterior portion coaxial with anaxis through the cylindrical opening.
 12. A method for alarminginterlocking armored fiber optic cables in a protective distributionsystem having a fiber optic distribution panel in fiber opticcommunication with at least one secured junction box through aninterlocking armored fiber optic cable, the junction box having at leastone interlocking armored fiber optic input cable and further having aplurality of outgoing interlocking armored fiber optic cables eachconnected to the junction box and each connected to a different secureduser lock box to transmit data through the fiber optic cables,comprising: providing at least a selected group of the plurality ofcables each having an optical fiber data transfer line, and furtherhaving a fiber optic outgoing alarm line and a fiber optic return alarmline to transmit alarm signals within each of the selected group ofcables; within each user lock box connected to the selected group ofcables, looping the outgoing alarm line to the return alarm linecontained within the same cable connected to that user lock box; forminga continuous fiber optic path of connected alarm lines by connecting thereturn alarm line of a first cable within the selected group to theoutgoing alarm line of another cable within the selected group, theconnecting occurring within the secure junction box, and also connectingthe outgoing alarm line to the return alarm line within the secure userlock box connected to the cable carrying both the outgoing and returnalarm lines that are joined in the secure user lock box; and connectingat least the return alarm line from a last one of the selected group ofcables to a detector to detect an alarm signal in the continuous fiberoptic path of connected alarm lines.
 13. The method of claim 12, whereina further plurality of cables in the selected group of cables each passthrough a wall of the junction box and also pass through a wall of theuser lock box, the method further comprising: adhering at least oneconnector to each cable in the further plurality of cables at thelocation where each cable passes through the wall of the junction box orthe wall of the user lock box, each connector encircling the cable towhich it is adhered and each connector having two spaced apart andparallel flanges on at least two sides of the connector; fastening theconnectors to the wall through which the cable adhered to the connectorpasses, the fastening achieved by having the wall or a restrainingmember connected to the junction box or user box fit between the flangesof the connector to restrain movement of the connector along a length ofthe cable at the location of the connector.
 14. The method of claim 12,wherein the detector is located in a telecommunications room and thedetector sends another signal activating an intrusion alert device whenthe detector detects an alarm signal in the continuous fiber optic path.15. The method of claim 12, wherein the input cable contains a fiberoptic data transfer line, an outgoing alarm line and a return alarm lineand wherein the method includes the step of placing that outgoing alarmline in the input cable into fiber optic communication with an outgoingalarm line in the selected group of cables, and wherein the input cablefurther contains a return alarm line and the method includes the step ofplacing that return alarm line in fiber optic communication with thereturn alarm line from the last of the selected group of cables.
 16. Themethod of claim 1, wherein the outgoing alarm line and the return alarmline are in fiber optic communication with the distribution panel andwherein the secure junction box and secure user lock box meet all U.S.Air Force AFI33-201V8 mandatory requirements for protective distributionsystems.
 17. The method of claim 1, comprising the step of locating thedistribution panel, junction box and all of the secured user lock boxeson the same floor of a building.
 18. A fiber optic network having atleast one secured junction box and a plurality of secured user boxeseach connected to the junction box by a different interlocking armoredfiber optic cable, the network comprising: a selected plurality of thefiber optic cables including at least a first cable connected to boththe junction box and a first secured user box and including a last cableconnected to both the junction box and a last secured user box, each ofthe selected plurality of cables including an outgoing fiber optic alarmline, a return fiber optic alarm line and at least one fiber optic dataline; the selected plurality of the fiber optic cables further havingthe outgoing line being looped to connect to the return line within thesecured user box that is connected to the cable such that the outgoingalarm line of the first cable connects to the return alarm line of thefirst cable within the first secured user box and the outgoing alarmline of the last cable connects to the return alarm line of the lastcable within the last secured user box; the selected plurality of fiberoptic cables further having the return alarm line connected to theoutgoing line of another cable within the selected plurality of fiberoptic cables, within the secured junction box, such that the returnalarm line of the first cable connects to the outgoing alarm line ofanother cable within the selected plurality of fiber optic cables toform an interconnected fiber optic alarm line extending through theselected plurality of fiber optic cables and the user boxes associatedwith the selected plurality of fiber optic cables from the first cableand first user box to the last cable and last user box; and a detectorin communication with the last return alarm line configured to send asignal to the outgoing alarm line and to detect an alarm signal in thelast return alarm line.