An improved system and method for protecting sensitive electronic
equipment or components against unauthorized access, by detecting and
also reacting to unauthorized intrusions into the enclosures for the
sensitive electronic equipment or components is disclosed. For example, a
protective system for protecting sensitive electronic equipment or
components against unauthorized access is disclosed that includes a fiber
optic cable mesh or network attached to, or embedded in, the walls of the
enclosure for the electronic equipment or components. A continuous signal
or burst is applied to the fiber optic cable, which is coupled to an
optical signal detection device. Thus, any attempt to remove or penetrate
the walls of the enclosure interrupts the signal in the fiber optic
cable, and the interruption of the signal is detected by the optical
signal detection device. In response to the detection of the interruption
of the signal in the fiber optic cable, a process can be initiated to
erase, destroy or alter sensitive data contained within the electronic
equipment or components. Also, a power source for the protective system
is disclosed, which can be self-sustaining and contained within the
protected enclosure for the sensitive electronic equipment or components.