Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524950
G.D. Smith, C.A. Pocratsky
The Department of Energy has a program that develops technologies to protect sensitive nuclear weapons facilities for more than thirty years. The program is nowhere near as large as it used to be, but nevertheless exists to help operational security systems overcome technical deficiencies. The mission of the program is overwhelmingly diverse, as it must be to protect an array of assets such as nuclear weapons, special nuclear material in various forms, components of nuclear weapons, and classified nuclear weapons design information. Considering that the nuclear weapons complex consists of dozens of facilities that are scattered all over the United States, and that no two facilities are alike, the technology development mission is very challenging. Complicating matters further is the ever uncertain future of the DOE and the national security role that it will play. The paper provides some examples of dramatic departmental mission changes that directly impact the security technology development program.
{"title":"The Department of Energy's safeguards and security technology development program","authors":"G.D. Smith, C.A. Pocratsky","doi":"10.1109/CCST.1995.524950","DOIUrl":"https://doi.org/10.1109/CCST.1995.524950","url":null,"abstract":"The Department of Energy has a program that develops technologies to protect sensitive nuclear weapons facilities for more than thirty years. The program is nowhere near as large as it used to be, but nevertheless exists to help operational security systems overcome technical deficiencies. The mission of the program is overwhelmingly diverse, as it must be to protect an array of assets such as nuclear weapons, special nuclear material in various forms, components of nuclear weapons, and classified nuclear weapons design information. Considering that the nuclear weapons complex consists of dozens of facilities that are scattered all over the United States, and that no two facilities are alike, the technology development mission is very challenging. Complicating matters further is the ever uncertain future of the DOE and the national security role that it will play. The paper provides some examples of dramatic departmental mission changes that directly impact the security technology development program.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115196201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524953
H. Kluepfel
The United States relies for its very existence-economically, socially, and politically-on an extraordinary sophisticated and intricate set of long distance networks for energy distribution, communication, and transportation. In addition to their serious vulnerabilities to accidents and nature, these networks present a tempting target to terrorists and to any antagonist contemplating an international move contrary to US interests. While warnings such as the one cited above predicted potentially catastrophic consequences, the fragility of today's global networks of computer based systems, used to business process reengineer America's industrial and military infrastructure into lanes on the information superhighway, together with concerns over information warfare, are taking front burner attention on the agenda's of military and civilian agencies within the United States. The paper describes and helps to further set the stage for the establishment and realization of a defensive information warfare security baseline architecture for the NII information superhighway and its global partners and components throughout their lifecycle, from research and development to deployment and beyond.
{"title":"Countering non-lethal information warfare: lessons learned on foiling the Information Superhighwayman of the North American public switched telephone network","authors":"H. Kluepfel","doi":"10.1109/CCST.1995.524953","DOIUrl":"https://doi.org/10.1109/CCST.1995.524953","url":null,"abstract":"The United States relies for its very existence-economically, socially, and politically-on an extraordinary sophisticated and intricate set of long distance networks for energy distribution, communication, and transportation. In addition to their serious vulnerabilities to accidents and nature, these networks present a tempting target to terrorists and to any antagonist contemplating an international move contrary to US interests. While warnings such as the one cited above predicted potentially catastrophic consequences, the fragility of today's global networks of computer based systems, used to business process reengineer America's industrial and military infrastructure into lanes on the information superhighway, together with concerns over information warfare, are taking front burner attention on the agenda's of military and civilian agencies within the United States. The paper describes and helps to further set the stage for the establishment and realization of a defensive information warfare security baseline architecture for the NII information superhighway and its global partners and components throughout their lifecycle, from research and development to deployment and beyond.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115404457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524730
K. Ohashi
This paper discusses the New Automatic Verification System. The introduction of this in response to a demand for greater capacity and higher speed processing for the fingerprint identification work being performed by National Police Agency of Japan, aims at an improved man-machine interface, raising the speed of processing, simplified procedures, a more integrated input system, etc., and has realized higher speed search and verification in comparison with the previous model.
{"title":"New model of automatic fingerprint verification system","authors":"K. Ohashi","doi":"10.1109/CCST.1995.524730","DOIUrl":"https://doi.org/10.1109/CCST.1995.524730","url":null,"abstract":"This paper discusses the New Automatic Verification System. The introduction of this in response to a demand for greater capacity and higher speed processing for the fingerprint identification work being performed by National Police Agency of Japan, aims at an improved man-machine interface, raising the speed of processing, simplified procedures, a more integrated input system, etc., and has realized higher speed search and verification in comparison with the previous model.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124239131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524910
J. Porteous
Behind all of the hype of intelligent superhighways, developments to make our homes and offices more intelligent have been gaining pace and several prominent systems are now available on the market. These are generally based on the introduction into the building of (sets of) homogeneous bus systems which then control a wide variety of functions (heating, lighting, AV, etc.). It is a relatively easy step for such systems to include security. The significant opportunities to the management and sophistication of alarm systems that this affords are discussed, as are some dangers in the hands of the unwary.
{"title":"Intelligent buildings and their effect on the security industry","authors":"J. Porteous","doi":"10.1109/CCST.1995.524910","DOIUrl":"https://doi.org/10.1109/CCST.1995.524910","url":null,"abstract":"Behind all of the hype of intelligent superhighways, developments to make our homes and offices more intelligent have been gaining pace and several prominent systems are now available on the market. These are generally based on the introduction into the building of (sets of) homogeneous bus systems which then control a wide variety of functions (heating, lighting, AV, etc.). It is a relatively easy step for such systems to include security. The significant opportunities to the management and sophistication of alarm systems that this affords are discussed, as are some dangers in the hands of the unwary.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115949611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524951
D. Holt, R. A. Young
In recent years there has been a significant increase in the number of intruder alarms installed in the United Kingdom. A large proportion of these installations have been made by installing companies regulated by the National Approval Council for Security Systems, (NACOSS), to ensure that the installations conform to the appropriate British Standard and related NACOSS-Codes. Individual installations are certificated, and records of each installation are kept centrally by NACOSS. New installations numbered over 130000 in 1994. A review is made in this paper of the effects of the installation of these alarms, drawing together information provided by the Home Office and the Police from their statistics, and from NACOSS records.
{"title":"The effect of intruder alarms on business losses, police activity and criminal behaviour in the United Kingdom","authors":"D. Holt, R. A. Young","doi":"10.1109/CCST.1995.524951","DOIUrl":"https://doi.org/10.1109/CCST.1995.524951","url":null,"abstract":"In recent years there has been a significant increase in the number of intruder alarms installed in the United Kingdom. A large proportion of these installations have been made by installing companies regulated by the National Approval Council for Security Systems, (NACOSS), to ensure that the installations conform to the appropriate British Standard and related NACOSS-Codes. Individual installations are certificated, and records of each installation are kept centrally by NACOSS. New installations numbered over 130000 in 1994. A review is made in this paper of the effects of the installation of these alarms, drawing together information provided by the Home Office and the Police from their statistics, and from NACOSS records.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124649152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524933
Erin McSherry, M. Smalley, T. Baldwin
It is common practice for a reflective film, for reducing solar gain, to be applied to the windows of guardrooms. The Security Equipment Assessment Laboratory has carried out a series of trials using different combinations of solar gain control reflective films and screen printed privacy films. These were applied on both single and secondary double glazed windows. The objective was to identify the optimum combination which would allow a guard to look out while obscuring the internal view from outside. The trials were undertaken with various levels of ambient lighting both inside and outside the guard room. This paper summarises the results obtained. It is anticipated that the conclusions will have applications outside the original remit of Guard Rooms into similar commercial security scenarios.
{"title":"Protecting your guardforce-fenestration obscuration techniques","authors":"Erin McSherry, M. Smalley, T. Baldwin","doi":"10.1109/CCST.1995.524933","DOIUrl":"https://doi.org/10.1109/CCST.1995.524933","url":null,"abstract":"It is common practice for a reflective film, for reducing solar gain, to be applied to the windows of guardrooms. The Security Equipment Assessment Laboratory has carried out a series of trials using different combinations of solar gain control reflective films and screen printed privacy films. These were applied on both single and secondary double glazed windows. The objective was to identify the optimum combination which would allow a guard to look out while obscuring the internal view from outside. The trials were undertaken with various levels of ambient lighting both inside and outside the guard room. This paper summarises the results obtained. It is anticipated that the conclusions will have applications outside the original remit of Guard Rooms into similar commercial security scenarios.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116690920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524906
J. Chiba, Y. Nemoto
The paper outlines the measures against noise in detectors for prediction of large seismic waves. According to Einstein's general theory of relativity, gravitational field turbulence is propagated by light velocity 3/spl times/10/sup 8/ (m/s), but on the other hand, the seismic wave itself is propagated by elastic wave velocity 7/spl times/10/sup 3/ (m/s). Accordingly, gravitational field turbulence due to a seismic wave reaches an observer instantaneously, whereas the seismic wave arrives much later. Prediction of a large seismic wave can therefore be achieved by observing the gravitational field turbulence. During the observation, optimum filtering plays an important role.
{"title":"Measures against noise in sensors for prediction of large seismic waves","authors":"J. Chiba, Y. Nemoto","doi":"10.1109/CCST.1995.524906","DOIUrl":"https://doi.org/10.1109/CCST.1995.524906","url":null,"abstract":"The paper outlines the measures against noise in detectors for prediction of large seismic waves. According to Einstein's general theory of relativity, gravitational field turbulence is propagated by light velocity 3/spl times/10/sup 8/ (m/s), but on the other hand, the seismic wave itself is propagated by elastic wave velocity 7/spl times/10/sup 3/ (m/s). Accordingly, gravitational field turbulence due to a seismic wave reaches an observer instantaneously, whereas the seismic wave arrives much later. Prediction of a large seismic wave can therefore be achieved by observing the gravitational field turbulence. During the observation, optimum filtering plays an important role.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124492918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524916
J. Howlett
The paper sets out some points which specifiers may wish to consider when preparing new security system proposals. It recommends that specifiers consider the maintenance requirements of systems and that through life cost comparisons are made when making a choice from a number of potentially suitable options. Experience shows that the lowest capital cost option does not always give the best value for money. The use of the through life cost comparison can identify the most economical solution. Often additional investment at the acquisition stage will result in lower overall costs during the life of the installation. The paper also gives some details of maintenance regimes and recommends that specifiers consider making provision for these when preparing their proposals. For the purpose of the paper the term specifier is intended to include security surveyors, advisors and designers.
{"title":"Maintenance: the specifier's influence","authors":"J. Howlett","doi":"10.1109/CCST.1995.524916","DOIUrl":"https://doi.org/10.1109/CCST.1995.524916","url":null,"abstract":"The paper sets out some points which specifiers may wish to consider when preparing new security system proposals. It recommends that specifiers consider the maintenance requirements of systems and that through life cost comparisons are made when making a choice from a number of potentially suitable options. Experience shows that the lowest capital cost option does not always give the best value for money. The use of the through life cost comparison can identify the most economical solution. Often additional investment at the acquisition stage will result in lower overall costs during the life of the installation. The paper also gives some details of maintenance regimes and recommends that specifiers consider making provision for these when preparing their proposals. For the purpose of the paper the term specifier is intended to include security surveyors, advisors and designers.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125812189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524960
T. Walsh
People do not like changes in the workplace, especially when those changes involve new technology. Yet, in the world of scientists and engineers, change is their life's work. Long before total quality management, scientists and engineers have been committed to continuous improvement. Never satisfied with the status quo, these pioneers continue to seek new ways to improve life and solve old problems. Great innovations can receive cold receptions because they represent change. The author considers how technical professionals can get management and other people excited about their work.
{"title":"Technological success requires people skills","authors":"T. Walsh","doi":"10.1109/CCST.1995.524960","DOIUrl":"https://doi.org/10.1109/CCST.1995.524960","url":null,"abstract":"People do not like changes in the workplace, especially when those changes involve new technology. Yet, in the world of scientists and engineers, change is their life's work. Long before total quality management, scientists and engineers have been committed to continuous improvement. Never satisfied with the status quo, these pioneers continue to seek new ways to improve life and solve old problems. Great innovations can receive cold receptions because they represent change. The author considers how technical professionals can get management and other people excited about their work.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130092161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524924
Clifton L. Smith, J. M. Cross
Characteristic markings on the cartridge and projectile of a bullet are produced when a gun is fired. Over thirty different features within these markings can be distinguished, which in combination produce a "fingerprint" for identification of a firearm. This paper describes an investigation into the development of an imaging system which can store, analyse, retrieve, and match high resolution digital images of cartridge cases. A computerised imaging system for ballistics identification will produce efficiencies in time and personnel, and permit a more precise audit of firearms within a country. The project has produced good quality high resolution digitised images of cartridge cases. The development of the optical system to optimise image quality has been crucial for the image identification phase. By classifying cartridge image attributes, it is possible to store the unique "signatures" of cartridge cases for identification. Appropriate image processing provides the signatures for the image library. The FIREBALL forensic ballistics interactive database incorporates a graphics user interface (GUI) to obtain precise ballistics metrics of cartridge case class characteristics. This project will significantly improve the effectiveness and efficiency of ballistics records and assist the tracing of firearms used in criminal activities by law enforcement agencies.
{"title":"Optical imaging techniques for ballistics specimens to identify firearms","authors":"Clifton L. Smith, J. M. Cross","doi":"10.1109/CCST.1995.524924","DOIUrl":"https://doi.org/10.1109/CCST.1995.524924","url":null,"abstract":"Characteristic markings on the cartridge and projectile of a bullet are produced when a gun is fired. Over thirty different features within these markings can be distinguished, which in combination produce a \"fingerprint\" for identification of a firearm. This paper describes an investigation into the development of an imaging system which can store, analyse, retrieve, and match high resolution digital images of cartridge cases. A computerised imaging system for ballistics identification will produce efficiencies in time and personnel, and permit a more precise audit of firearms within a country. The project has produced good quality high resolution digitised images of cartridge cases. The development of the optical system to optimise image quality has been crucial for the image identification phase. By classifying cartridge image attributes, it is possible to store the unique \"signatures\" of cartridge cases for identification. Appropriate image processing provides the signatures for the image library. The FIREBALL forensic ballistics interactive database incorporates a graphics user interface (GUI) to obtain precise ballistics metrics of cartridge case class characteristics. This project will significantly improve the effectiveness and efficiency of ballistics records and assist the tracing of firearms used in criminal activities by law enforcement agencies.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122220341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}