Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524918
O. Mueller
The explosive devices, charges sent by post or by messenger services are a special group of the IEDs (Improvised Explosive Devices). The lecture will show a short impression of the history of the PPLBs. The PPLBs (Post Parcel and Letter Bombs) are mainly EBTs (Explosive Booby Traps). The addressee's dynamic activity will cause the detonation of the hidden explosive mechanism. Sometimes the PPLBs are "general directed infernal machines", the detonation occurs at the target institution, for example at a post office, a city-hall, at a railway station. The paper classifies several types of PPLBs. The defence possibilities are well known in the international antiterrorist practice, but sometimes "security-holes", leakages cause dramatic situations. The author shows some examples of the occurred attempts by PPLBs.
{"title":"Post Parcel and Letter Bombs (PPLBs)","authors":"O. Mueller","doi":"10.1109/CCST.1995.524918","DOIUrl":"https://doi.org/10.1109/CCST.1995.524918","url":null,"abstract":"The explosive devices, charges sent by post or by messenger services are a special group of the IEDs (Improvised Explosive Devices). The lecture will show a short impression of the history of the PPLBs. The PPLBs (Post Parcel and Letter Bombs) are mainly EBTs (Explosive Booby Traps). The addressee's dynamic activity will cause the detonation of the hidden explosive mechanism. Sometimes the PPLBs are \"general directed infernal machines\", the detonation occurs at the target institution, for example at a post office, a city-hall, at a railway station. The paper classifies several types of PPLBs. The defence possibilities are well known in the international antiterrorist practice, but sometimes \"security-holes\", leakages cause dramatic situations. The author shows some examples of the occurred attempts by PPLBs.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126007507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524943
G. M. Stone, K. Bluitt
In the United States and worldwide, enciphered digital wireless systems are on the verge of proliferation as the Associated Public Safety Communications Officials (APCO) Project 25 advanced narrowband digital communications (ANDC) standards for law enforcement are finalized. Likewise, in Europe, the TETRA digital standards will likely accelerate deployment of digital wireless systems throughout the Continent. Both APCO Project 25 FDMA and TETRA TDMA system architectures are intended to support infrastructure dependent public safety and internal security "dispatch" operations whilst APCO Project 25 is more amenable to non-infrastructure based communications. We address the system features now available in first generation ANDC systems. In addition, we make recommendations appertaining to the design, modeling and simulation parameters applicable to both enciphered and unprotected digital tactical wireless communications architectures suitable for law enforcement and internal security purposes. As we move into the digital world, is should be noted that the performance of enciphered digital wireless systems are severely impacted not only by the magnitude of the recovered radio frequency signal but more so by the phase perturbations typically encountered in tactical wireless environments. Thus, enciphered digital wireless system design, modeling and simulation must be multi-dimensional, recognizing and overcoming those environmental aspects which most significantly affect its viability.
{"title":"Advanced digital communications system design considerations for law enforcement and internal security purposes","authors":"G. M. Stone, K. Bluitt","doi":"10.1109/CCST.1995.524943","DOIUrl":"https://doi.org/10.1109/CCST.1995.524943","url":null,"abstract":"In the United States and worldwide, enciphered digital wireless systems are on the verge of proliferation as the Associated Public Safety Communications Officials (APCO) Project 25 advanced narrowband digital communications (ANDC) standards for law enforcement are finalized. Likewise, in Europe, the TETRA digital standards will likely accelerate deployment of digital wireless systems throughout the Continent. Both APCO Project 25 FDMA and TETRA TDMA system architectures are intended to support infrastructure dependent public safety and internal security \"dispatch\" operations whilst APCO Project 25 is more amenable to non-infrastructure based communications. We address the system features now available in first generation ANDC systems. In addition, we make recommendations appertaining to the design, modeling and simulation parameters applicable to both enciphered and unprotected digital tactical wireless communications architectures suitable for law enforcement and internal security purposes. As we move into the digital world, is should be noted that the performance of enciphered digital wireless systems are severely impacted not only by the magnitude of the recovered radio frequency signal but more so by the phase perturbations typically encountered in tactical wireless environments. Thus, enciphered digital wireless system design, modeling and simulation must be multi-dimensional, recognizing and overcoming those environmental aspects which most significantly affect its viability.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126092280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524912
H.C. Muller, A. Fischer
Multi sensor based fire detection (MSbFD) systems are one of the important current developments in automatic fire detection technology. The two main objectives of this progress are the still unacceptable false alarm behaviour and improvements in the fire detection capabilities (i.e. shorter detection times) of fire detection systems. The use of more than one sensor in a fire detector gives an improved image of the environment monitored and hence allows a safer alarm decision. Multi sensor technology allows but does imply the enhancement of fire detection systems in the desired directions. The crucial point is the evaluation and interpretation of the signals produced by the monitored phenomena. This signal processing (detection algorithm) mostly determines the detectors capabilities. Due to the availability of microcontrollers applicable to fire detector technology with its severe technical constraints (i.e. power consumption) modern signal processing techniques (neural networks, fuzzy logic) can be used. The paper presents a MSbFD algorithm using two fire parameters (temperature and optical smoke density). These two sensors were chosen since ionization systems may become increasingly difficult to apply because of the environmental regulations being imposed on them. The evaluation and processing of the sensor signals is carried out by the use of fuzzy logic. The concept of the algorithm is outlined and its performance and robustness in the fire and the non-fire case is shown by simulation results.
{"title":"A robust fire detection algorithm for temperature and optical smoke density using fuzzy logic","authors":"H.C. Muller, A. Fischer","doi":"10.1109/CCST.1995.524912","DOIUrl":"https://doi.org/10.1109/CCST.1995.524912","url":null,"abstract":"Multi sensor based fire detection (MSbFD) systems are one of the important current developments in automatic fire detection technology. The two main objectives of this progress are the still unacceptable false alarm behaviour and improvements in the fire detection capabilities (i.e. shorter detection times) of fire detection systems. The use of more than one sensor in a fire detector gives an improved image of the environment monitored and hence allows a safer alarm decision. Multi sensor technology allows but does imply the enhancement of fire detection systems in the desired directions. The crucial point is the evaluation and interpretation of the signals produced by the monitored phenomena. This signal processing (detection algorithm) mostly determines the detectors capabilities. Due to the availability of microcontrollers applicable to fire detector technology with its severe technical constraints (i.e. power consumption) modern signal processing techniques (neural networks, fuzzy logic) can be used. The paper presents a MSbFD algorithm using two fire parameters (temperature and optical smoke density). These two sensors were chosen since ionization systems may become increasingly difficult to apply because of the environmental regulations being imposed on them. The evaluation and processing of the sensor signals is carried out by the use of fuzzy logic. The concept of the algorithm is outlined and its performance and robustness in the fire and the non-fire case is shown by simulation results.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115013814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524939
A. Mcleod
A summary of the drawbacks of video recorders in CCTV applications is presented. The paper continues with arguments for the use of digital video recording techniques. It describes the features of a digital system developed for car park entrance control which can be applied to all types of access control, incident capture and perimeter protection. Finally, the wider implications of the use of such technology is considered.
{"title":"Digital video storage for security applications","authors":"A. Mcleod","doi":"10.1109/CCST.1995.524939","DOIUrl":"https://doi.org/10.1109/CCST.1995.524939","url":null,"abstract":"A summary of the drawbacks of video recorders in CCTV applications is presented. The paper continues with arguments for the use of digital video recording techniques. It describes the features of a digital system developed for car park entrance control which can be applied to all types of access control, incident capture and perimeter protection. Finally, the wider implications of the use of such technology is considered.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115620854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524747
R. Thompson
The continued loss of lucrative military contracts has caused western manufacturers of night-vision components and systems to review their marketing strategy. But the product range remains essentially unaltered and, as the equipment was originally designed for a military role, it can be unsuited to police use. The paper outlines the present state of low-light surveillance imaging and notes that although development work on image-intensifiers still continues, this work is likely to contract with the reduction in military sponsorship. It reports the use of Russian night-vision equipment by the criminal, the effect of this on police operations, and proposes a way forward for future research and development.
{"title":"New developments in night-vision equipment and techniques","authors":"R. Thompson","doi":"10.1109/CCST.1995.524747","DOIUrl":"https://doi.org/10.1109/CCST.1995.524747","url":null,"abstract":"The continued loss of lucrative military contracts has caused western manufacturers of night-vision components and systems to review their marketing strategy. But the product range remains essentially unaltered and, as the equipment was originally designed for a military role, it can be unsuited to police use. The paper outlines the present state of low-light surveillance imaging and notes that although development work on image-intensifiers still continues, this work is likely to contract with the reduction in military sponsorship. It reports the use of Russian night-vision equipment by the criminal, the effect of this on police operations, and proposes a way forward for future research and development.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121201691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524746
D. Daniels
This paper reviews the principles of surface penetrating radar, discusses the technical requirements for the individual sub-systems comprising a surface penetrating radar and provides examples of typical applications for the method. Continued technical improvements in system performance enable clearer radar images of the internal structure of materials to be obtained, thus advancing the application of the technique.
{"title":"Searching for buried objects with surface penetrating radar","authors":"D. Daniels","doi":"10.1109/CCST.1995.524746","DOIUrl":"https://doi.org/10.1109/CCST.1995.524746","url":null,"abstract":"This paper reviews the principles of surface penetrating radar, discusses the technical requirements for the individual sub-systems comprising a surface penetrating radar and provides examples of typical applications for the method. Continued technical improvements in system performance enable clearer radar images of the internal structure of materials to be obtained, thus advancing the application of the technique.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524929
C. Tarr, S. Peaty
The overall aim of any decisions concerning perimeter security is to strike a balance between security and cost. This necessitates making difficult choices between barriers, alarm systems and staff for patrol or response duties. A computer software package known as CLASP (Comparative Layout Analysis for Secure Perimeters) was developed to support this decision making process. It is based on a mathematical model that evaluates sets of performance measures, such as the chance of an escape, and the cost of construction, for a number of alternative perimeter arrangements.
{"title":"Using CLASP to assess perimeter security","authors":"C. Tarr, S. Peaty","doi":"10.1109/CCST.1995.524929","DOIUrl":"https://doi.org/10.1109/CCST.1995.524929","url":null,"abstract":"The overall aim of any decisions concerning perimeter security is to strike a balance between security and cost. This necessitates making difficult choices between barriers, alarm systems and staff for patrol or response duties. A computer software package known as CLASP (Comparative Layout Analysis for Secure Perimeters) was developed to support this decision making process. It is based on a mathematical model that evaluates sets of performance measures, such as the chance of an escape, and the cost of construction, for a number of alternative perimeter arrangements.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122986535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524954
H. Devereux, M. Smalley
Infra red lighting has become common place in providing illumination for surveillance systems. Manufacturers have developed better illuminators to provide greater range and have produced efficient optics for reducing visible illumination and enhancing the IR output. However little investigation into the harmful effects of infra red light has been carried out with reference to these illuminators, and hence no guidelines exist. The concern is focused on the fact that infra red light is not visible to the eye and hence the eye's normal protection system is incapable of reacting to the energy. Damage effects are well understood with regard to infra red radiation in the context of hot object viewing, as in the steel and forging application. With this in mind the Security Equipment Assessment Laboratory has considered IR illuminators and their harmful effects. The paper presents an overview of the current knowledge base and draws conclusions and recommendations on safe working and design practices.
{"title":"Are infra red illuminators eye safe?","authors":"H. Devereux, M. Smalley","doi":"10.1109/CCST.1995.524954","DOIUrl":"https://doi.org/10.1109/CCST.1995.524954","url":null,"abstract":"Infra red lighting has become common place in providing illumination for surveillance systems. Manufacturers have developed better illuminators to provide greater range and have produced efficient optics for reducing visible illumination and enhancing the IR output. However little investigation into the harmful effects of infra red light has been carried out with reference to these illuminators, and hence no guidelines exist. The concern is focused on the fact that infra red light is not visible to the eye and hence the eye's normal protection system is incapable of reacting to the energy. Damage effects are well understood with regard to infra red radiation in the context of hot object viewing, as in the steel and forging application. With this in mind the Security Equipment Assessment Laboratory has considered IR illuminators and their harmful effects. The paper presents an overview of the current knowledge base and draws conclusions and recommendations on safe working and design practices.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126737733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524948
P. Gallagher, S. Doyle
A long standing problem within the banking security and law enforcement communities has been the inability to use the images recorded with conventional security cameras as definitive evidence in a court of law. The issue with affordable solid state or tube security cameras is the spatial resolution and gray scale resolution. Neither is sufficient. Alternatives using film cameras have proved too expensive and embarrassingly unreliable. The advancement of high resolution solid state cameras promises to overcome today's technological and economic barriers. A series of static tests of the EG&G Reticon model MD4013 camera in a major financial institution in Chicago, Illinois showed such good results that a full scale installation trial was initiated. This trial took place during the late winter through the summer of 1995. The paper first describes the million pixel CCD camera used in the customer's trial, then describes the image capture, storage and communications system used, and finally reports the results of the trial.
{"title":"Evidence quality imaging for bank security","authors":"P. Gallagher, S. Doyle","doi":"10.1109/CCST.1995.524948","DOIUrl":"https://doi.org/10.1109/CCST.1995.524948","url":null,"abstract":"A long standing problem within the banking security and law enforcement communities has been the inability to use the images recorded with conventional security cameras as definitive evidence in a court of law. The issue with affordable solid state or tube security cameras is the spatial resolution and gray scale resolution. Neither is sufficient. Alternatives using film cameras have proved too expensive and embarrassingly unreliable. The advancement of high resolution solid state cameras promises to overcome today's technological and economic barriers. A series of static tests of the EG&G Reticon model MD4013 camera in a major financial institution in Chicago, Illinois showed such good results that a full scale installation trial was initiated. This trial took place during the late winter through the summer of 1995. The paper first describes the million pixel CCD camera used in the customer's trial, then describes the image capture, storage and communications system used, and finally reports the results of the trial.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126213540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524726
N.H. Parsons
An investigation was carried out to evaluate the performance of a Multi-Layer Perceptron based neural network transient classifier for detecting attacks, using bolt cutters, on security fences. A tape containing acoustic recordings from fence mounted microphonic cable security systems was used in the investigation. The data was digitised and Fourier Transformed and the resulting spectrograms were subject to detailed examination, in conjunction with aural analysis, in order to deduce appropriate time/frequency resolution for distinguishing genuine attacks from background signals. This facilitated the selection of suitable candidate sets of processing parameters for the system. The data was then partitioned into training and test data. Normalised spectrograms were extracted from the training data and labelled appropriately as "Fencecut" or "Backgrnd" for use as training templates for the neural networks. A back-propagation algorithm was used for training the neural networks.
{"title":"Performance of a neural network based transient classifier at monitoring an acoustic perimeter intruder detection system","authors":"N.H. Parsons","doi":"10.1109/CCST.1995.524726","DOIUrl":"https://doi.org/10.1109/CCST.1995.524726","url":null,"abstract":"An investigation was carried out to evaluate the performance of a Multi-Layer Perceptron based neural network transient classifier for detecting attacks, using bolt cutters, on security fences. A tape containing acoustic recordings from fence mounted microphonic cable security systems was used in the investigation. The data was digitised and Fourier Transformed and the resulting spectrograms were subject to detailed examination, in conjunction with aural analysis, in order to deduce appropriate time/frequency resolution for distinguishing genuine attacks from background signals. This facilitated the selection of suitable candidate sets of processing parameters for the system. The data was then partitioned into training and test data. Normalised spectrograms were extracted from the training data and labelled appropriately as \"Fencecut\" or \"Backgrnd\" for use as training templates for the neural networks. A back-propagation algorithm was used for training the neural networks.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126093283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}