Perimeter Defense: Four Technologies for Detecting and Preventing Illegal Logging