Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107843
R. Desourdis, J. Contestabile
This paper explores why information sharing is important to successfully dealing with large-scale events and how a lack of public safety communications systems interoperability is a major impediment. It describes how “holistic interoperability,” which addresses matters of trust and understanding that lead to predictable collaboration, is needed and how the lessons from the lack of information sharing during Pearl Harbor remains instructive today. It goes on to describe how a conceptual technical framework of information layers (i.e., the data, integration and presentation layers) is useful to developing solutions to this lack of interoperability. It also postulates how emerging technologies will move us from today's flawed “publish-and-subscribe” environment, which suffers from many of the “Pearl Harbor failures,” to an automated preplanned “sense-and — respond” model. Work reported herein was derived from an Urban Area Security Grant as part of interoperable communications programs for the National Capital Region (NCR).
{"title":"Information sharing for situational understanding and command coordination in emergency management and disaster response","authors":"R. Desourdis, J. Contestabile","doi":"10.1109/THS.2011.6107843","DOIUrl":"https://doi.org/10.1109/THS.2011.6107843","url":null,"abstract":"This paper explores why information sharing is important to successfully dealing with large-scale events and how a lack of public safety communications systems interoperability is a major impediment. It describes how “holistic interoperability,” which addresses matters of trust and understanding that lead to predictable collaboration, is needed and how the lessons from the lack of information sharing during Pearl Harbor remains instructive today. It goes on to describe how a conceptual technical framework of information layers (i.e., the data, integration and presentation layers) is useful to developing solutions to this lack of interoperability. It also postulates how emerging technologies will move us from today's flawed “publish-and-subscribe” environment, which suffers from many of the “Pearl Harbor failures,” to an automated preplanned “sense-and — respond” model. Work reported herein was derived from an Urban Area Security Grant as part of interoperable communications programs for the National Capital Region (NCR).","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121472139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107869
B. Buddemeier, N. Suski
Reducing the casualties of catastrophic terrorist attacks requires an understanding of weapons of mass destruction effects, infrastructure damage, atmospheric dispersion, and health effects. The Federal Planning Guidance for Response to a Nuclear Detonation provides the strategy for response to an improvised nuclear device detonation. The supporting science developed by national laboratories and other technical organizations for this document significantly improves our understanding of the hazards posed by such an event. Detailed fallout predictions from the advanced suite of three-dimensional meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory, including extensive global geographical and realtime meteorological databases to support model calculations, are a key part of response planning. This presentation describes the methodology and results to date, including visualization aids developed for response organizations. These products have greatly enhanced the community planning process through first-person points of view and description of the dynamic nature of the event.
{"title":"Improvised nuclear device case study: An analytic framework for disaster management","authors":"B. Buddemeier, N. Suski","doi":"10.1109/THS.2011.6107869","DOIUrl":"https://doi.org/10.1109/THS.2011.6107869","url":null,"abstract":"Reducing the casualties of catastrophic terrorist attacks requires an understanding of weapons of mass destruction effects, infrastructure damage, atmospheric dispersion, and health effects. The Federal Planning Guidance for Response to a Nuclear Detonation provides the strategy for response to an improvised nuclear device detonation. The supporting science developed by national laboratories and other technical organizations for this document significantly improves our understanding of the hazards posed by such an event. Detailed fallout predictions from the advanced suite of three-dimensional meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory, including extensive global geographical and realtime meteorological databases to support model calculations, are a key part of response planning. This presentation describes the methodology and results to date, including visualization aids developed for response organizations. These products have greatly enhanced the community planning process through first-person points of view and description of the dynamic nature of the event.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127972831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107880
Akankshu Dhawan, R. Balasubramanian, V. Vokkarane
Wireless Sensors have been used for environmental monitoring and battlefield surveillance for many years now. Wireless, low-cost, and low-energy sensors are distributed geographically to monitor and report specific effects such as temperature, light, motion and sound. The hardware, network protocols and information retrieval techniques for wireless sensor networks are areas of active research. While outdoor monitoring has been done using wireless sensor networks for some time now, little work has been done in indoor environments. This paper presents a novel approach towards a real time system for indoor surveillance of campus-like environments for loud acoustic events such as gunshots. The work proposes the use of low-cost MICAz motes and a scalable networking approach that ensures low-energy consumption, reliable communication and high data rate. The system uses a hierarchical decision making model to categorize loud acoustic signals, localize the event and trigger an alert system in case of critical events like a gunshot. Several experiments were conducted with real gunshots and other acoustic sources to validate the detection and localization approach.
{"title":"A framework for real-time monitoring of acoustic events using a wireless sensor network","authors":"Akankshu Dhawan, R. Balasubramanian, V. Vokkarane","doi":"10.1109/THS.2011.6107880","DOIUrl":"https://doi.org/10.1109/THS.2011.6107880","url":null,"abstract":"Wireless Sensors have been used for environmental monitoring and battlefield surveillance for many years now. Wireless, low-cost, and low-energy sensors are distributed geographically to monitor and report specific effects such as temperature, light, motion and sound. The hardware, network protocols and information retrieval techniques for wireless sensor networks are areas of active research. While outdoor monitoring has been done using wireless sensor networks for some time now, little work has been done in indoor environments. This paper presents a novel approach towards a real time system for indoor surveillance of campus-like environments for loud acoustic events such as gunshots. The work proposes the use of low-cost MICAz motes and a scalable networking approach that ensures low-energy consumption, reliable communication and high data rate. The system uses a hierarchical decision making model to categorize loud acoustic signals, localize the event and trigger an alert system in case of critical events like a gunshot. Several experiments were conducted with real gunshots and other acoustic sources to validate the detection and localization approach.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"XCV 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131386991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107841
M. Sharbaf
The uses of computer communications networks technologies have increased the incidents of computer abuse. Because of these incidents, most organizations facing pressure to protect their assets. Most digital networks generally rely on modern cryptosystems to secure the confidentiality and integrity of traffic carried across the network. The current modern cryptosystems based on mathematical model introduce potential security holes related to technological progress of computing power, the key refresh rate and key expansion ratio, the most crucial parameters in the security of any cryptographic techniques. For that reason efforts have been made to establish new foundation for cryptography science in the computer communications networks. One of these efforts has led to the development of quantum cryptography technology, whose security relies on the laws of quantum mechanics [1,2,3,20, 24]. This research paper concentrates on quantum cryptography, and how this technology contributes to the network security. The scope of this research paper is to cover the weaknesses, and the security pitfalls in modern cryptography, fundamental concepts of quantum cryptography, the real — world application implementation of this technology, finally the future direction in which the quantum cryptography is headed forwards.
{"title":"Quantum cryptography: An emerging technology in network security","authors":"M. Sharbaf","doi":"10.1109/THS.2011.6107841","DOIUrl":"https://doi.org/10.1109/THS.2011.6107841","url":null,"abstract":"The uses of computer communications networks technologies have increased the incidents of computer abuse. Because of these incidents, most organizations facing pressure to protect their assets. Most digital networks generally rely on modern cryptosystems to secure the confidentiality and integrity of traffic carried across the network. The current modern cryptosystems based on mathematical model introduce potential security holes related to technological progress of computing power, the key refresh rate and key expansion ratio, the most crucial parameters in the security of any cryptographic techniques. For that reason efforts have been made to establish new foundation for cryptography science in the computer communications networks. One of these efforts has led to the development of quantum cryptography technology, whose security relies on the laws of quantum mechanics [1,2,3,20, 24]. This research paper concentrates on quantum cryptography, and how this technology contributes to the network security. The scope of this research paper is to cover the weaknesses, and the security pitfalls in modern cryptography, fundamental concepts of quantum cryptography, the real — world application implementation of this technology, finally the future direction in which the quantum cryptography is headed forwards.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130196718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107848
C. Axelrod
There is much talk in government and private sector circles about setting up additional test laboratories for certifying commonly-used software and hardware products. It has also been suggested that quality control and oversight be included at each step of the supply-chain. However, reviews are typically done after-the-fact, and have much less value for controlling processes. Often only when malware or rogue components are discovered in final products are more thorough audits initiated. By then it is often too late to retrieve items already in production. Much damage could have already occurred by the time a recall takes effect. The author has long supported supply-chain customers and entities installing sensors to monitor processes and products throughout the supply-chain life cycle. At various stages, products and services should be sent to laboratories for testing or be subjected to internal tests to verify that they comply with design specifications and external requirements.
{"title":"Assuring software and hardware security and integrity throughout the supply chain","authors":"C. Axelrod","doi":"10.1109/THS.2011.6107848","DOIUrl":"https://doi.org/10.1109/THS.2011.6107848","url":null,"abstract":"There is much talk in government and private sector circles about setting up additional test laboratories for certifying commonly-used software and hardware products. It has also been suggested that quality control and oversight be included at each step of the supply-chain. However, reviews are typically done after-the-fact, and have much less value for controlling processes. Often only when malware or rogue components are discovered in final products are more thorough audits initiated. By then it is often too late to retrieve items already in production. Much damage could have already occurred by the time a recall takes effect. The author has long supported supply-chain customers and entities installing sensors to monitor processes and products throughout the supply-chain life cycle. At various stages, products and services should be sent to laboratories for testing or be subjected to internal tests to verify that they comply with design specifications and external requirements.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122087307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107871
A. Yousefi, A. Dibazar, T. Berger
In this paper, a sensor fusion technique with enhanced performance in assets' protection is introduced. The presented fusion technique models activity dynamics in the protected area by combining acoustic, seismic and vibration sensors outputs. The proposed algorithm learns underlying normal activities in the protected area; and detects abnormal activities — possible threat using sensor outputs. The activity learning in the smart fence evolves through time, and it is independent of prior assumption of threat models. The simulation result developed for cargo train protection shows more than 98% performance in possible threat detection, which performs at least 3% better than naive detection technique. Activity dynamics in large scale areas — airports and military basis — can be modeled using the proposed fusion technique, in which the computational complexity for threat detection is not significant. The capability of the methodology to adjust its free parameters through time makes the threat detection process robust to existing environmental and activity dynamics changes.
{"title":"Aggregating seismic, acoustic and vibration sensor outputs for enhancing threat detection performance and estimating threat-level","authors":"A. Yousefi, A. Dibazar, T. Berger","doi":"10.1109/THS.2011.6107871","DOIUrl":"https://doi.org/10.1109/THS.2011.6107871","url":null,"abstract":"In this paper, a sensor fusion technique with enhanced performance in assets' protection is introduced. The presented fusion technique models activity dynamics in the protected area by combining acoustic, seismic and vibration sensors outputs. The proposed algorithm learns underlying normal activities in the protected area; and detects abnormal activities — possible threat using sensor outputs. The activity learning in the smart fence evolves through time, and it is independent of prior assumption of threat models. The simulation result developed for cargo train protection shows more than 98% performance in possible threat detection, which performs at least 3% better than naive detection technique. Activity dynamics in large scale areas — airports and military basis — can be modeled using the proposed fusion technique, in which the computational complexity for threat detection is not significant. The capability of the methodology to adjust its free parameters through time makes the threat detection process robust to existing environmental and activity dynamics changes.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124857269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107912
Julia Carn
Raytheon and GlobalTrak participated in the European Union's Framework Program 7 (FP7) Smart Container Management (Smart-CM) Project, which strove to demonstrate state-of-the-art tracking and condition monitoring technologies, to explore their integration into value-added services for business and government agencies, and to participate in the development of best practices and standards. Raytheon and GlobalTrak provided 24 GlobalTrak Wedge devices to the three logistics services providers involved in the project: COSCO, DHL, and Kuehne + Nagel. These devices were deployed between October 2010 and July 2011 in a total of 42 trips on seven secure trade lanes between Europe, the Middle East, and Asia. Tri-modal (road, rail, and sea) tracking and condition monitoring was successfully demonstrated. The Smart-CM trials successfully provided container security data (geo-tracking and door status), which is of essential interest to Customs authorities. The value-added service sought by both regulatory agencies and commercial operators include security status, estimated time of arrival (ETA), dwell time, breach notification, exception handling, and container location and scheduling. In order to develop a viable, long-term business case for the value-added services required by business and government stakeholders, it will be necessary to integrate Container Security Device (CSD) data with data provided by other players in the supply chain, such as cargo owners, shipping lines, and ports. This challenge could be addressed in a future cooperative EU/US endeavor.
{"title":"Smart Container Management: Creating value from real-time container security device data","authors":"Julia Carn","doi":"10.1109/THS.2011.6107912","DOIUrl":"https://doi.org/10.1109/THS.2011.6107912","url":null,"abstract":"Raytheon and GlobalTrak participated in the European Union's Framework Program 7 (FP7) Smart Container Management (Smart-CM) Project, which strove to demonstrate state-of-the-art tracking and condition monitoring technologies, to explore their integration into value-added services for business and government agencies, and to participate in the development of best practices and standards. Raytheon and GlobalTrak provided 24 GlobalTrak Wedge devices to the three logistics services providers involved in the project: COSCO, DHL, and Kuehne + Nagel. These devices were deployed between October 2010 and July 2011 in a total of 42 trips on seven secure trade lanes between Europe, the Middle East, and Asia. Tri-modal (road, rail, and sea) tracking and condition monitoring was successfully demonstrated. The Smart-CM trials successfully provided container security data (geo-tracking and door status), which is of essential interest to Customs authorities. The value-added service sought by both regulatory agencies and commercial operators include security status, estimated time of arrival (ETA), dwell time, breach notification, exception handling, and container location and scheduling. In order to develop a viable, long-term business case for the value-added services required by business and government stakeholders, it will be necessary to integrate Container Security Device (CSD) data with data provided by other players in the supply chain, such as cargo owners, shipping lines, and ports. This challenge could be addressed in a future cooperative EU/US endeavor.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129748718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107896
W. Walsh, C. Blais, Lyla A Englehorn, Perry McDowell
Emergency response operational systems often do not work as expected by users. Subject matter expertise is not always considered for system design when developing the system requirements, and interagency coordination is often absent. With the Real-time Online Game-based Use-case Engine for Validation of Interagency Doctrine in Emergency Operations (ROGUEVIDEO) project we are attempting to build a bridge between operational environments and synthetic environments. The ROGUEVIDEO approach is to capture subject matter expert (SME)-validated doctrine, plans, procedures, equipment, decision making and systems in an architectural framework, then build a transfer mechanism from the architectural framework to an open source synthetic environment. The integrity of the SME input will result in more relevant and accurate simulations to better prepare global emergency responders. Interagency and international planning and response to natural and man-made disasters require new capabilities for planners and responders. Emergency response practitioners require the ability to test, exercise and challenge existing doctrines, plans and equipment for a variety of emergency scenarios. Further, they need a system that will capture response best practices and subject matter expertise. Currently, we have found stakeholders do have limited tools to look at their own doctrines in isolation, but what is lacking is an interagency validation framework for working on the increasing complexity of multi-agency emergency response activities, as well as a sufficient training environment. One of the main tenets of the ROGUEVIDEO project is to leverage and build on existing efforts. To realize this, we have researched domestic efforts for modeling and simulation, training and exercises, and emergency planning and response frameworks. Our findings surfaced various national doctrine such as the National Response Framework (NRF) and the National Incident Management System (NIMS) as well as the Homeland Security Exercise Evaluation Program (HSEEP) which provides a principal foundation for us to elicit data inputs from operators. To test this approach, we held an HSEEP Data Collection Workshop at the MOVES Institute on 24 February 2011. This served as our first step toward collecting SME input to inform development of the synthetic environment. By the HSEEP definition, this initial workshop was truly a hybrid of a traditional seminar and workshop, designed to acquaint participants with the ROGUEVIDEO project and approach before we move to the next step of discussing the plan or way ahead for using a table top exercise (TTX) to elicit SME data inputs. The subsequent TTX conducted in August 2011 in Long Beach, California, helped validate and highlight successes of symbiotic doctrine; tactics, techniques and procedures (TTPs); standard operating procedures (SOPs); and equipment use, as well as surface interagency gaps related to National Planning Scenario 11, a radiological dispersal even
{"title":"Real-time Online Game-based Use-case Engine for Validation of Interagency Doctrine in Emergency Operations: Research exploring the use of synthetic environments to augment disaster planning, preparation, response, and recovery","authors":"W. Walsh, C. Blais, Lyla A Englehorn, Perry McDowell","doi":"10.1109/THS.2011.6107896","DOIUrl":"https://doi.org/10.1109/THS.2011.6107896","url":null,"abstract":"Emergency response operational systems often do not work as expected by users. Subject matter expertise is not always considered for system design when developing the system requirements, and interagency coordination is often absent. With the Real-time Online Game-based Use-case Engine for Validation of Interagency Doctrine in Emergency Operations (ROGUEVIDEO) project we are attempting to build a bridge between operational environments and synthetic environments. The ROGUEVIDEO approach is to capture subject matter expert (SME)-validated doctrine, plans, procedures, equipment, decision making and systems in an architectural framework, then build a transfer mechanism from the architectural framework to an open source synthetic environment. The integrity of the SME input will result in more relevant and accurate simulations to better prepare global emergency responders. Interagency and international planning and response to natural and man-made disasters require new capabilities for planners and responders. Emergency response practitioners require the ability to test, exercise and challenge existing doctrines, plans and equipment for a variety of emergency scenarios. Further, they need a system that will capture response best practices and subject matter expertise. Currently, we have found stakeholders do have limited tools to look at their own doctrines in isolation, but what is lacking is an interagency validation framework for working on the increasing complexity of multi-agency emergency response activities, as well as a sufficient training environment. One of the main tenets of the ROGUEVIDEO project is to leverage and build on existing efforts. To realize this, we have researched domestic efforts for modeling and simulation, training and exercises, and emergency planning and response frameworks. Our findings surfaced various national doctrine such as the National Response Framework (NRF) and the National Incident Management System (NIMS) as well as the Homeland Security Exercise Evaluation Program (HSEEP) which provides a principal foundation for us to elicit data inputs from operators. To test this approach, we held an HSEEP Data Collection Workshop at the MOVES Institute on 24 February 2011. This served as our first step toward collecting SME input to inform development of the synthetic environment. By the HSEEP definition, this initial workshop was truly a hybrid of a traditional seminar and workshop, designed to acquaint participants with the ROGUEVIDEO project and approach before we move to the next step of discussing the plan or way ahead for using a table top exercise (TTX) to elicit SME data inputs. The subsequent TTX conducted in August 2011 in Long Beach, California, helped validate and highlight successes of symbiotic doctrine; tactics, techniques and procedures (TTPs); standard operating procedures (SOPs); and equipment use, as well as surface interagency gaps related to National Planning Scenario 11, a radiological dispersal even","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126779385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107856
N. Onur Bakir, E. Kardes
We present a stochastic game model that compares alternatives for better container security. The players are an attacker who plans a nuclear attack, and a defender who considers two interdiction alternatives. The attacker can choose the container path, the attack method and the target, whereas the defender might improve transportation security and inspections at domestic seaports. In the baseline case, the attacker ships a nuclear weapon under the disguise of a front company and through a foreign seaport that does not participate in the Container Security Initiative. The target is a domestic seaport despite the higher economic toll of an urban attack. The defender should improve transportation security, but improvement decisions on domestic seaport inspections should be scrutinized carefully.
{"title":"A stochastic game model on container security","authors":"N. Onur Bakir, E. Kardes","doi":"10.1109/THS.2011.6107856","DOIUrl":"https://doi.org/10.1109/THS.2011.6107856","url":null,"abstract":"We present a stochastic game model that compares alternatives for better container security. The players are an attacker who plans a nuclear attack, and a defender who considers two interdiction alternatives. The attacker can choose the container path, the attack method and the target, whereas the defender might improve transportation security and inspections at domestic seaports. In the baseline case, the attacker ships a nuclear weapon under the disguise of a front company and through a foreign seaport that does not participate in the Container Security Initiative. The target is a domestic seaport despite the higher economic toll of an urban attack. The defender should improve transportation security, but improvement decisions on domestic seaport inspections should be scrutinized carefully.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107914
G. Bottan
The likelihood of a terrorist organization obtaining and transporting a nuclear weapon to the U.S. is considered by many to be low, but the threat is real and the consequences are potentially catastrophic. If such a situation were to occur, what would the response of the United States be? This paper emphasizes that closing all ports of entry would cost billions of dollars and that to mitigate such costs the U.S. should have in place mechanisms and equipment capable of clearing containers from nuclear weapons, so ports of entry can continue to operate, even if at reduced volumes. Allowing goods into our country would keep factories running, emergency facilities operational, and medical supplies and other humanitarian help flowing, making our nation more capable of responding to such a crisis. The paper explains one approach for keeping our ports open. It describes the use of a technology called Effective Z in 3D (EZ-3D™) whereby a sea cargo container would be automatically inspected to locate high Z anomalies (characteristic of nuclear materials and/or shielding) within a minute. Simultaneously, a second technology called “Prompt Neutrons from Photo fission” (PNPF) would automatically clear the container from having fissionable material. The container could be allowed into the country if no fissionable anomalies are detected. If a container is found to have anomalies or an alert related to fissionable material is produced, a third technology called Nuclear Resonance Fluorescence (NRF) would be used. NRF can examine the anomaly by measuring the isotopic content of the materials in the regions of interest and resolve any alert or ambiguity via material identification.
许多人认为,恐怖组织获得核武器并将其运送到美国的可能性很低,但这种威胁是真实的,其后果可能是灾难性的。如果发生这种情况,美国将作何反应?本文强调,关闭所有入境口岸将花费数十亿美元,为了减少这些成本,美国应该建立能够清除核武器集装箱的机制和设备,这样入境口岸就可以继续运作,即使数量减少。允许货物进入我国将使工厂继续运转,应急设施继续运转,医疗用品和其他人道主义援助源源不断,使我国更有能力应对这样的危机。这篇论文解释了保持我们的港口开放的一种方法。它描述了一种名为Effective Z in 3D (EZ-3D™)的技术的使用,通过该技术,海运货物集装箱将在一分钟内自动检查以定位高Z异常(核材料和/或屏蔽的特征)。与此同时,另一种被称为“光裂变产生的瞬发中子”(PNPF)的技术将自动清除容器中的可裂变物质。如果没有检测到裂变异常,该容器可以被允许进入该国。如果发现容器有异常或产生与裂变物质有关的警报,则会使用第三种技术,称为核共振荧光(NRF)。NRF可以通过测量感兴趣区域中物质的同位素含量来检查异常,并通过物质识别来解决任何警告或模糊。
{"title":"Avoiding the closure of ports during a national emergency","authors":"G. Bottan","doi":"10.1109/THS.2011.6107914","DOIUrl":"https://doi.org/10.1109/THS.2011.6107914","url":null,"abstract":"The likelihood of a terrorist organization obtaining and transporting a nuclear weapon to the U.S. is considered by many to be low, but the threat is real and the consequences are potentially catastrophic. If such a situation were to occur, what would the response of the United States be? This paper emphasizes that closing all ports of entry would cost billions of dollars and that to mitigate such costs the U.S. should have in place mechanisms and equipment capable of clearing containers from nuclear weapons, so ports of entry can continue to operate, even if at reduced volumes. Allowing goods into our country would keep factories running, emergency facilities operational, and medical supplies and other humanitarian help flowing, making our nation more capable of responding to such a crisis. The paper explains one approach for keeping our ports open. It describes the use of a technology called Effective Z in 3D (EZ-3D™) whereby a sea cargo container would be automatically inspected to locate high Z anomalies (characteristic of nuclear materials and/or shielding) within a minute. Simultaneously, a second technology called “Prompt Neutrons from Photo fission” (PNPF) would automatically clear the container from having fissionable material. The container could be allowed into the country if no fissionable anomalies are detected. If a container is found to have anomalies or an alert related to fissionable material is produced, a third technology called Nuclear Resonance Fluorescence (NRF) would be used. NRF can examine the anomaly by measuring the isotopic content of the materials in the regions of interest and resolve any alert or ambiguity via material identification.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115288472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}