Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655052
Saheed Hamid, T. Mazucchi, S. Sarkani
Military supplies have unique functions that are not widely used elsewhere, so there are likely limited producers of these items. In times of war, the usage rate for military materiel increases dramatically and demand follows a non-linear pattern. Whether the items are bullets or tanks, if their production facilities are destroyed or severely damaged by acts of terrorism, natural, or man-made disasters, what recourse would the military have in order to acquire these unique supplies? To mitigate this risk, is it worth the expense and effort to duplicate the capability or it is more advantageous to stockpile unique commodities in case of such disasters? Is it advisable to acquire a temporary or emergency capability, until an indigenous capability can be reconstituted? This paper seeks to develop an optimizing process to answer these logistics and policy questions, using a process similar to the Military Decision Making Process (MDMP).
{"title":"Disruption management optimization for defense industrial base systems","authors":"Saheed Hamid, T. Mazucchi, S. Sarkani","doi":"10.1109/THS.2010.5655052","DOIUrl":"https://doi.org/10.1109/THS.2010.5655052","url":null,"abstract":"Military supplies have unique functions that are not widely used elsewhere, so there are likely limited producers of these items. In times of war, the usage rate for military materiel increases dramatically and demand follows a non-linear pattern. Whether the items are bullets or tanks, if their production facilities are destroyed or severely damaged by acts of terrorism, natural, or man-made disasters, what recourse would the military have in order to acquire these unique supplies? To mitigate this risk, is it worth the expense and effort to duplicate the capability or it is more advantageous to stockpile unique commodities in case of such disasters? Is it advisable to acquire a temporary or emergency capability, until an indigenous capability can be reconstituted? This paper seeks to develop an optimizing process to answer these logistics and policy questions, using a process similar to the Military Decision Making Process (MDMP).","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132671160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655088
Bozhao Tan, Qi Li, Robert Foresta
Identification of non-native personnel is a critical piece of information for making crucial on-the-spot decisions for security purposes. Identification of a non-native speaker is often readily apparent in normal conversation with a native speaker through speech content and accent. Such identification which requires familiarity with language nuances may not be possible for a non-native interrogator or intelligence analyst or when conversing or listening through a machine language translator. Developing an automatic system to identify speakers as native or non-native, as well as their native language, including dialect, within input audio streams, is the major goal of this project. Such a system may be used alone or with other downstream applications such as machine language translation systems. In this paper we present four approaches to identify native and non-native speakers as a binary recognition problem. The approaches can be further categorized into phonetic-based approaches and non-phonetic-based approaches. These approaches were tested on two separate databases, including text-dependent read speech and text-independent spontaneous speech. The results show that our system is competitive in comparison with other published, state-of-the-art non-native speaker recognition systems. Key metrics for automated non-native recognition systems include: 1) positive identification rates, 2) false alarm/identification rates, and 3) length of captured speech sample required to reach a decision.
{"title":"An automatic non-native speaker recognition system","authors":"Bozhao Tan, Qi Li, Robert Foresta","doi":"10.1109/THS.2010.5655088","DOIUrl":"https://doi.org/10.1109/THS.2010.5655088","url":null,"abstract":"Identification of non-native personnel is a critical piece of information for making crucial on-the-spot decisions for security purposes. Identification of a non-native speaker is often readily apparent in normal conversation with a native speaker through speech content and accent. Such identification which requires familiarity with language nuances may not be possible for a non-native interrogator or intelligence analyst or when conversing or listening through a machine language translator. Developing an automatic system to identify speakers as native or non-native, as well as their native language, including dialect, within input audio streams, is the major goal of this project. Such a system may be used alone or with other downstream applications such as machine language translation systems. In this paper we present four approaches to identify native and non-native speakers as a binary recognition problem. The approaches can be further categorized into phonetic-based approaches and non-phonetic-based approaches. These approaches were tested on two separate databases, including text-dependent read speech and text-independent spontaneous speech. The results show that our system is competitive in comparison with other published, state-of-the-art non-native speaker recognition systems. Key metrics for automated non-native recognition systems include: 1) positive identification rates, 2) false alarm/identification rates, and 3) length of captured speech sample required to reach a decision.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654947
R. Chandra, G. Davatz, A. Howard
A neutron scintillation detector based on high-pressure 4He has been developed and tested. The detector responds to elastic scattering of unmoderated fast neutrons, preserving neutron energy, position, and timing information. Neutrons from three different sources, AmBe, 252Cf, and from the ambient background, have been measured with clearly distinct energy spectra. Exposing the detector to different levels of gamma radiation up to 1 mSv/h from a 60Co source has demonstrated that gamma exposure does not affect neutron detection performance within measurement statistics. Applications in the field of radiation portal monitoring are discussed.
{"title":"Gamma-insensitive fast neutron detector with spectral source identification potential","authors":"R. Chandra, G. Davatz, A. Howard","doi":"10.1109/THS.2010.5654947","DOIUrl":"https://doi.org/10.1109/THS.2010.5654947","url":null,"abstract":"A neutron scintillation detector based on high-pressure 4He has been developed and tested. The detector responds to elastic scattering of unmoderated fast neutrons, preserving neutron energy, position, and timing information. Neutrons from three different sources, AmBe, 252Cf, and from the ambient background, have been measured with clearly distinct energy spectra. Exposing the detector to different levels of gamma radiation up to 1 mSv/h from a 60Co source has demonstrated that gamma exposure does not affect neutron detection performance within measurement statistics. Applications in the field of radiation portal monitoring are discussed.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655085
R. Linger, M. Pleszkoch, Kirk Sayre, Timothy Daly
Automated software behavior computation is an emerging technology under development at the Software Engineering Institute that can be applied to analysis of malicious code. Behavior computation is based on the semantics of programming language instructions and the opportunity to compose them to determine net effects of programs. An initial implementation is targeted to malicious code expressed in Intel assembly language.
{"title":"Automated computation of malware behavior","authors":"R. Linger, M. Pleszkoch, Kirk Sayre, Timothy Daly","doi":"10.1109/THS.2010.5655085","DOIUrl":"https://doi.org/10.1109/THS.2010.5655085","url":null,"abstract":"Automated software behavior computation is an emerging technology under development at the Software Engineering Institute that can be applied to analysis of malicious code. Behavior computation is based on the semantics of programming language instructions and the opportunity to compose them to determine net effects of programs. An initial implementation is targeted to malicious code expressed in Intel assembly language.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133143122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654952
J. Fernandes, R. Obermeier, M. Hagelen, J. Martinez-Lorenzo, C. Rappaport
With the recent rise in casualties resulting from person-borne improvised explosive devices (PBIEDs) or ”suicide bombers,” there is an urgent need for standoff detection of such threats. An optimum system that fulfills the requirements of standoff detection must be portable, low cost, and have a high probability of detection with low probability of false alarm at a distance of at least 20 meters. Currently there are a variety of modalities being researched to perform standoff detection of PBIED's including: backscatter X-ray imaging, infrared imaging, optical detection, terahertz imaging, video analytics, and millimeter-wave (MMW) imaging. MMW imaging at 94 GHz is a very good modality for performing standoff detection of PBIEDs. MMWs can propagate through the atmosphere and clothing with very little attenuation, while at the same time do not cause damage to human skin tissue. A mono-static linear frequency modulated continuous wave (LFMCW) circular inverse synthetic aperture radar (ISAR) system has been developed and tested. A model of such a system using a two dimensional full wave analysis based on the finite difference method in the frequency domain has been developed and compared with results of the experimental system. Using a two dimensional matched filtering technique in the frequency domain, simulated images have been used as a means of performing target detection and classification. The imaging results of both simulated and experimentally obtained data is presented in this paper. Initial results using the 2D matched filtering target classification technique will also be presented.
{"title":"A comparison of experimental and modeled results of an active millimeter wave inverse synthetic aperture radar system used to perform standoff detection of person-borne improvised explosive devices","authors":"J. Fernandes, R. Obermeier, M. Hagelen, J. Martinez-Lorenzo, C. Rappaport","doi":"10.1109/THS.2010.5654952","DOIUrl":"https://doi.org/10.1109/THS.2010.5654952","url":null,"abstract":"With the recent rise in casualties resulting from person-borne improvised explosive devices (PBIEDs) or ”suicide bombers,” there is an urgent need for standoff detection of such threats. An optimum system that fulfills the requirements of standoff detection must be portable, low cost, and have a high probability of detection with low probability of false alarm at a distance of at least 20 meters. Currently there are a variety of modalities being researched to perform standoff detection of PBIED's including: backscatter X-ray imaging, infrared imaging, optical detection, terahertz imaging, video analytics, and millimeter-wave (MMW) imaging. MMW imaging at 94 GHz is a very good modality for performing standoff detection of PBIEDs. MMWs can propagate through the atmosphere and clothing with very little attenuation, while at the same time do not cause damage to human skin tissue. A mono-static linear frequency modulated continuous wave (LFMCW) circular inverse synthetic aperture radar (ISAR) system has been developed and tested. A model of such a system using a two dimensional full wave analysis based on the finite difference method in the frequency domain has been developed and compared with results of the experimental system. Using a two dimensional matched filtering technique in the frequency domain, simulated images have been used as a means of performing target detection and classification. The imaging results of both simulated and experimentally obtained data is presented in this paper. Initial results using the 2D matched filtering target classification technique will also be presented.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130037954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655081
P. Peterson
Random Access Memory (RAM) was recently shown to be vulnerable to physical attacks exposing the totality of memory, including user data and encryption keys. We present Cryptkeeper, a novel software-encrypted virtual memory manager that mitigates data exposure when used with a secure key-hiding mechanism. Cryptkeeper significantly reduces the amount of cleartext data in memory by dividing RAM into a smaller, cleartext working set and a larger, encrypted area. This extends the standard memory model and provides encrypted swap as a side effect. Despite a 9x slowdown in pathological cases, target applications such as Firefox are only 9% slower with our Linux-based prototype. We also identify several optimizations which can significantly improve performance. Cryptkeeper enables the expression of new security policies for memory, and demonstrates that modern personal computers can perform heavy-duty work on behalf of operating systems with surprisingly low overhead.
{"title":"Cryptkeeper: Improving security with encrypted RAM","authors":"P. Peterson","doi":"10.1109/THS.2010.5655081","DOIUrl":"https://doi.org/10.1109/THS.2010.5655081","url":null,"abstract":"Random Access Memory (RAM) was recently shown to be vulnerable to physical attacks exposing the totality of memory, including user data and encryption keys. We present Cryptkeeper, a novel software-encrypted virtual memory manager that mitigates data exposure when used with a secure key-hiding mechanism. Cryptkeeper significantly reduces the amount of cleartext data in memory by dividing RAM into a smaller, cleartext working set and a larger, encrypted area. This extends the standard memory model and provides encrypted swap as a side effect. Despite a 9x slowdown in pathological cases, target applications such as Firefox are only 9% slower with our Linux-based prototype. We also identify several optimizations which can significantly improve performance. Cryptkeeper enables the expression of new security policies for memory, and demonstrates that modern personal computers can perform heavy-duty work on behalf of operating systems with surprisingly low overhead.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"598 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115106196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654944
Joshua R. Wood, J. Legere, M. McConnell, J. Ryan
We previously reported Compton imaging measurements of 137Cs and 60Co laboratory sources using the full 15-channel readout of the Gamma-Ray Experimental Telescope Assembly (GRETA). We have since modified the detector geometry to accommodate a wider range of Compton scattering angles and implemented a neural networking method for the location of interaction positions with a 3-cm resolution inside the detector volumes. This paper describes the implementation of the neural networking method and culminates in the imaging of 137Cs, 60Co, and 252Cf sources using this technique.
{"title":"Location and identification of radioactive material with the GRETA (Gamma-Ray Experimental Telescope Assembly)","authors":"Joshua R. Wood, J. Legere, M. McConnell, J. Ryan","doi":"10.1109/THS.2010.5654944","DOIUrl":"https://doi.org/10.1109/THS.2010.5654944","url":null,"abstract":"We previously reported Compton imaging measurements of 137Cs and 60Co laboratory sources using the full 15-channel readout of the Gamma-Ray Experimental Telescope Assembly (GRETA). We have since modified the detector geometry to accommodate a wider range of Compton scattering angles and implemented a neural networking method for the location of interaction positions with a 3-cm resolution inside the detector volumes. This paper describes the implementation of the neural networking method and culminates in the imaging of 137Cs, 60Co, and 252Cf sources using this technique.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128502393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654943
J. Ryan, C. Bancroft, P. Bloser, U. Bravar, C. Frost, M. McConnell, J. Legere, Joshua R. Wood, R. Woolf, D. Fourguette, L. Larocque, Jane C. Pavlich, G. Ritter, Gregory J. Wassick
We have developed, fabricated and tested a prototype imaging neutron spectrometer designed for real-time neutron source location and identification. Real-time detection and identification is important for locating materials. These materials, specifically uranium and transuranics, emit neutrons via spontaneous or induced fission. Unlike other forms of radiation (e.g. gamma rays), penetrating neutron emission is very uncommon. The instrument detects these neutrons, constructs images of the emission pattern, and reports the neutron spectrum. The device will be useful for security and proliferation deterrence, as well as for nuclear waste characterization and monitoring. The instrument is optimized for imaging and spectroscopy in the 1–20 MeV range. The detection principle is based upon multiple elastic neutron-proton scatters in organic scintillator. Two detector panel layers are utilized. By measuring the recoil proton and scattered neutron locations and energies, the direction and energy spectrum of the incident neutrons can be determined and discrete and extended sources identified. Event reconstruction yields an image of the source and its location. The hardware is low power, low mass, and rugged. Its modular design allows the user to combine multiple units for increased sensitivity. We will report the results of laboratory testing of the instrument, including exposure to a calibrated Cf-252 source. Instrument parameters include energy and angular resolution, gamma rejection, minimum source identification distances and times, and projected effective area for a fully populated instrument.
{"title":"An imaging neutron spectrometer","authors":"J. Ryan, C. Bancroft, P. Bloser, U. Bravar, C. Frost, M. McConnell, J. Legere, Joshua R. Wood, R. Woolf, D. Fourguette, L. Larocque, Jane C. Pavlich, G. Ritter, Gregory J. Wassick","doi":"10.1109/THS.2010.5654943","DOIUrl":"https://doi.org/10.1109/THS.2010.5654943","url":null,"abstract":"We have developed, fabricated and tested a prototype imaging neutron spectrometer designed for real-time neutron source location and identification. Real-time detection and identification is important for locating materials. These materials, specifically uranium and transuranics, emit neutrons via spontaneous or induced fission. Unlike other forms of radiation (e.g. gamma rays), penetrating neutron emission is very uncommon. The instrument detects these neutrons, constructs images of the emission pattern, and reports the neutron spectrum. The device will be useful for security and proliferation deterrence, as well as for nuclear waste characterization and monitoring. The instrument is optimized for imaging and spectroscopy in the 1–20 MeV range. The detection principle is based upon multiple elastic neutron-proton scatters in organic scintillator. Two detector panel layers are utilized. By measuring the recoil proton and scattered neutron locations and energies, the direction and energy spectrum of the incident neutrons can be determined and discrete and extended sources identified. Event reconstruction yields an image of the source and its location. The hardware is low power, low mass, and rugged. Its modular design allows the user to combine multiple units for increased sensitivity. We will report the results of laboratory testing of the instrument, including exposure to a calibrated Cf-252 source. Instrument parameters include energy and angular resolution, gamma rejection, minimum source identification distances and times, and projected effective area for a fully populated instrument.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134157143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655097
Vivek Pathak
Counterfeiting is a serious problem impacting customers and producers in the global economy. We design authenticated product labels (APL), a cryptography based practical counterfeit detection method. Our solution can be used by customers, distributors, and law enforcement alike. APLs not only detects counterfeit goods, but also deters counterfeiting by provably pinpointing its source in the supply chain. Counterfeiting is a serious problem impacting customers and producers in the global economy. We design authenticated product labels (APL), a cryptography based practical counterfeit detection method. Our solution can be used by customers, distributors, and law enforcement alike. APLs not only detects counterfeit goods, but also deters counterfeiting by provably pinpointing its source in the supply chain.
{"title":"Improving supply chain robustness and preventing counterfeiting through authenticated product labels","authors":"Vivek Pathak","doi":"10.1109/THS.2010.5655097","DOIUrl":"https://doi.org/10.1109/THS.2010.5655097","url":null,"abstract":"Counterfeiting is a serious problem impacting customers and producers in the global economy. We design authenticated product labels (APL), a cryptography based practical counterfeit detection method. Our solution can be used by customers, distributors, and law enforcement alike. APLs not only detects counterfeit goods, but also deters counterfeiting by provably pinpointing its source in the supply chain. Counterfeiting is a serious problem impacting customers and producers in the global economy. We design authenticated product labels (APL), a cryptography based practical counterfeit detection method. Our solution can be used by customers, distributors, and law enforcement alike. APLs not only detects counterfeit goods, but also deters counterfeiting by provably pinpointing its source in the supply chain.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133168693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654962
L. Levine, Carol Woody
When catastrophes occur, what key dynamics take place? How do these dynamics affect our technical infrastructure, and how can we understand these patterns of failure in order to better build and operate future technologies and systems of systems? What happens when catastrophes are unprecedented and the known range of emergency response activities is ineffective? This research analyzes multiple catastrophes, viewed through designated lenses, with consideration of how systems of systems fail, as well as the implications for future systems of systems. In this phase we studied two cases, Hurricane Katrina and 9/11, representing threats from natural forces and terrorism. The lens used is the Generic Error Modeling System (GEMS). The GEMS framework helps us to understand types of errors that occur in operational situations and distinguishes among skill-, rule-, and knowledge-based modes. We report on key findings in three areas: (1) the problematic role that technology plays given its fragility and dominance, (2) a coordination and centralization effect, and (3) the failure to consider failure.
{"title":"System of systems analysis of catastrophic events: A preliminary investigation of unprecedented scenarios","authors":"L. Levine, Carol Woody","doi":"10.1109/THS.2010.5654962","DOIUrl":"https://doi.org/10.1109/THS.2010.5654962","url":null,"abstract":"When catastrophes occur, what key dynamics take place? How do these dynamics affect our technical infrastructure, and how can we understand these patterns of failure in order to better build and operate future technologies and systems of systems? What happens when catastrophes are unprecedented and the known range of emergency response activities is ineffective? This research analyzes multiple catastrophes, viewed through designated lenses, with consideration of how systems of systems fail, as well as the implications for future systems of systems. In this phase we studied two cases, Hurricane Katrina and 9/11, representing threats from natural forces and terrorism. The lens used is the Generic Error Modeling System (GEMS). The GEMS framework helps us to understand types of errors that occur in operational situations and distinguishes among skill-, rule-, and knowledge-based modes. We report on key findings in three areas: (1) the problematic role that technology plays given its fragility and dominance, (2) a coordination and centralization effect, and (3) the failure to consider failure.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125975251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}