Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524927
K. Harman
Discusses INTREPID Reflex Cable (RC) acoustic cable intrusion sensor technology. Prototype units have been tested on chain link fences at a number of sites under various environmental conditions. This paper presents results of this testing. There have been a number of papers that describe the problems associated with acoustic cable sensors on fences. A key problem has been excessive false alarms due to wind, rain and other environmental conditions. Variation in sensitivity due to the fence condition is a major problem. The ability of INTREPID MicroPoint Coax Cable sensor to locate the disturbance along the length of the sensor provides a means of effectively solving these problems.
{"title":"INTREPID fence disturbance sensor performance testing","authors":"K. Harman","doi":"10.1109/CCST.1995.524927","DOIUrl":"https://doi.org/10.1109/CCST.1995.524927","url":null,"abstract":"Discusses INTREPID Reflex Cable (RC) acoustic cable intrusion sensor technology. Prototype units have been tested on chain link fences at a number of sites under various environmental conditions. This paper presents results of this testing. There have been a number of papers that describe the problems associated with acoustic cable sensors on fences. A key problem has been excessive false alarms due to wind, rain and other environmental conditions. Variation in sensitivity due to the fence condition is a major problem. The ability of INTREPID MicroPoint Coax Cable sensor to locate the disturbance along the length of the sensor provides a means of effectively solving these problems.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117155288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524743
D. Lowe
The worldwide quick reaction deployment concept for the tactical automated security system (TASS) was demonstrated to have great value in a base defense operational exercise. TASS equipment was deployed and used as part of the Foal Eagle 94 exercise at Kunsan AB, Korea. The TASS functions of detection, data communication, annunciation, assessment and portable power were evaluated using prototype equipment. The results of the TASS operation during the exercise was very impressive. The friendly forces quickly incorporated the TASS equipment into their defensive operations and were able to intercept and neutralize approximately 80% of the aggressor force penetration attempts at the defensive perimeter.
{"title":"Tactical automated security system (TASS): operational concept field evaluation results","authors":"D. Lowe","doi":"10.1109/CCST.1995.524743","DOIUrl":"https://doi.org/10.1109/CCST.1995.524743","url":null,"abstract":"The worldwide quick reaction deployment concept for the tactical automated security system (TASS) was demonstrated to have great value in a base defense operational exercise. TASS equipment was deployed and used as part of the Foal Eagle 94 exercise at Kunsan AB, Korea. The TASS functions of detection, data communication, annunciation, assessment and portable power were evaluated using prototype equipment. The results of the TASS operation during the exercise was very impressive. The friendly forces quickly incorporated the TASS equipment into their defensive operations and were able to intercept and neutralize approximately 80% of the aggressor force penetration attempts at the defensive perimeter.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133061768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524960
T. Walsh
People do not like changes in the workplace, especially when those changes involve new technology. Yet, in the world of scientists and engineers, change is their life's work. Long before total quality management, scientists and engineers have been committed to continuous improvement. Never satisfied with the status quo, these pioneers continue to seek new ways to improve life and solve old problems. Great innovations can receive cold receptions because they represent change. The author considers how technical professionals can get management and other people excited about their work.
{"title":"Technological success requires people skills","authors":"T. Walsh","doi":"10.1109/CCST.1995.524960","DOIUrl":"https://doi.org/10.1109/CCST.1995.524960","url":null,"abstract":"People do not like changes in the workplace, especially when those changes involve new technology. Yet, in the world of scientists and engineers, change is their life's work. Long before total quality management, scientists and engineers have been committed to continuous improvement. Never satisfied with the status quo, these pioneers continue to seek new ways to improve life and solve old problems. Great innovations can receive cold receptions because they represent change. The author considers how technical professionals can get management and other people excited about their work.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130092161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524916
J. Howlett
The paper sets out some points which specifiers may wish to consider when preparing new security system proposals. It recommends that specifiers consider the maintenance requirements of systems and that through life cost comparisons are made when making a choice from a number of potentially suitable options. Experience shows that the lowest capital cost option does not always give the best value for money. The use of the through life cost comparison can identify the most economical solution. Often additional investment at the acquisition stage will result in lower overall costs during the life of the installation. The paper also gives some details of maintenance regimes and recommends that specifiers consider making provision for these when preparing their proposals. For the purpose of the paper the term specifier is intended to include security surveyors, advisors and designers.
{"title":"Maintenance: the specifier's influence","authors":"J. Howlett","doi":"10.1109/CCST.1995.524916","DOIUrl":"https://doi.org/10.1109/CCST.1995.524916","url":null,"abstract":"The paper sets out some points which specifiers may wish to consider when preparing new security system proposals. It recommends that specifiers consider the maintenance requirements of systems and that through life cost comparisons are made when making a choice from a number of potentially suitable options. Experience shows that the lowest capital cost option does not always give the best value for money. The use of the through life cost comparison can identify the most economical solution. Often additional investment at the acquisition stage will result in lower overall costs during the life of the installation. The paper also gives some details of maintenance regimes and recommends that specifiers consider making provision for these when preparing their proposals. For the purpose of the paper the term specifier is intended to include security surveyors, advisors and designers.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125812189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524728
I. Wassell, R. M. Rodger
The last line of defence in preventing an escape from a high security prison is often a wall. Walls can prevent escape, by providing both delay and deterrence. However, without any reliable form of associated detection system then interception can only be fortuitous. A paper study of the types of walls used by European Prison Services was undertaken for the Prison Service in August 1993. Simultaneously, work was being pursued on the redesign of walls and wall top devices for the highest category prisons in England. Both threads of work amalgamated in an evaluation programme that included Government scientists, engineers, Prison Officials and UK industry. Several samples of wall top devices and height adjustments were evaluated to learn the cost effectiveness of delay. Meanwhile, work was progressing on the development and evaluation of detection systems for mounting on wall tops. An earlier development between Government and industry had produced a system that had good detection performance, a low false alarm rate but was not used operationally due to cost considerations. This paper will review the work to date concentrating on the evaluation of both the wall top devices and the detection system. It will address some strengths and weaknesses and will also look at some operational considerations.
{"title":"Wall tops: operational considerations for barriers and detectors","authors":"I. Wassell, R. M. Rodger","doi":"10.1109/CCST.1995.524728","DOIUrl":"https://doi.org/10.1109/CCST.1995.524728","url":null,"abstract":"The last line of defence in preventing an escape from a high security prison is often a wall. Walls can prevent escape, by providing both delay and deterrence. However, without any reliable form of associated detection system then interception can only be fortuitous. A paper study of the types of walls used by European Prison Services was undertaken for the Prison Service in August 1993. Simultaneously, work was being pursued on the redesign of walls and wall top devices for the highest category prisons in England. Both threads of work amalgamated in an evaluation programme that included Government scientists, engineers, Prison Officials and UK industry. Several samples of wall top devices and height adjustments were evaluated to learn the cost effectiveness of delay. Meanwhile, work was progressing on the development and evaluation of detection systems for mounting on wall tops. An earlier development between Government and industry had produced a system that had good detection performance, a low false alarm rate but was not used operationally due to cost considerations. This paper will review the work to date concentrating on the evaluation of both the wall top devices and the detection system. It will address some strengths and weaknesses and will also look at some operational considerations.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129211259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524905
E. Greneker
There is growing interest in the United States in the protection of high value assets from aircraft intrusion. Aircraft technology has improved Helicopters can serve as an intruder transport, a highly mobile weapon platform, and an escape vehicle after an intrusion has been committed. The helicopter can also serve as a transport for a high value material asset that may be stolen. Fixed wing aircraft are also a threat. The suicide mission to destroy an asset or generate adverse publicity is credible. If there is sufficient runway, the fixed wing aircraft can serve as a transport of intruders into a protected site, an intruder escape vehicle, or a transport for a stolen high value asset. The runway for a short take off and landing (STOL) aircraft used as intrusion vehicle can be any cleared area, including roadways only 100 meters in length with obstructions 20 meters high at the end. There may be existing, in place aircraft detection sensors near most sites that can be used to detect an aircraft's presence and provide early warning. If not, there is another family of sensors that can detect, track, and classify detected aircraft as fixed wing or helicopter. This second class of sensor can be installed if high resolution tracking of a target is required. The paper discusses the principles of aircraft detection, reviews some of the technology presently on the market for aircraft detection, and presents test data to show the ranges at which aircraft can be detected by these types of sensors.
{"title":"Technology for the detection of airborne intruders approaching the high-security, high-value asset","authors":"E. Greneker","doi":"10.1109/CCST.1995.524905","DOIUrl":"https://doi.org/10.1109/CCST.1995.524905","url":null,"abstract":"There is growing interest in the United States in the protection of high value assets from aircraft intrusion. Aircraft technology has improved Helicopters can serve as an intruder transport, a highly mobile weapon platform, and an escape vehicle after an intrusion has been committed. The helicopter can also serve as a transport for a high value material asset that may be stolen. Fixed wing aircraft are also a threat. The suicide mission to destroy an asset or generate adverse publicity is credible. If there is sufficient runway, the fixed wing aircraft can serve as a transport of intruders into a protected site, an intruder escape vehicle, or a transport for a stolen high value asset. The runway for a short take off and landing (STOL) aircraft used as intrusion vehicle can be any cleared area, including roadways only 100 meters in length with obstructions 20 meters high at the end. There may be existing, in place aircraft detection sensors near most sites that can be used to detect an aircraft's presence and provide early warning. If not, there is another family of sensors that can detect, track, and classify detected aircraft as fixed wing or helicopter. This second class of sensor can be installed if high resolution tracking of a target is required. The paper discusses the principles of aircraft detection, reviews some of the technology presently on the market for aircraft detection, and presents test data to show the ranges at which aircraft can be detected by these types of sensors.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128375136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524928
B. W. Martin
Radio frequency (RF) based systems have been successfully deployed in personnel identification and access control applications where the tag read ranges are usually less than one meter. Such technology has also been used in the identification of assets such as raw and finished goods inventory. These assets are well controlled so that one meter or less read ranges are adequate. Attempts to apply RF technology to the problems of location, identification and control of assets and/or people within a facility have exposed the limitations of RF over longer read ranges. The tag to reader path is no longer homogeneous because walls, furnishings, and equipment introduce impairments to the simple direct propagation of RF energy, so that the presence of an RF signal at a receiver cannot be used as a reliable indication of location. This paper describes the WatchIt system which combines the transmission power of radio frequency with the containment control of infrared to accurately locate and track assets and personnel within facilities.
{"title":"WatchIt. A fully supervised identification, location and tracking system","authors":"B. W. Martin","doi":"10.1109/CCST.1995.524928","DOIUrl":"https://doi.org/10.1109/CCST.1995.524928","url":null,"abstract":"Radio frequency (RF) based systems have been successfully deployed in personnel identification and access control applications where the tag read ranges are usually less than one meter. Such technology has also been used in the identification of assets such as raw and finished goods inventory. These assets are well controlled so that one meter or less read ranges are adequate. Attempts to apply RF technology to the problems of location, identification and control of assets and/or people within a facility have exposed the limitations of RF over longer read ranges. The tag to reader path is no longer homogeneous because walls, furnishings, and equipment introduce impairments to the simple direct propagation of RF energy, so that the presence of an RF signal at a receiver cannot be used as a reliable indication of location. This paper describes the WatchIt system which combines the transmission power of radio frequency with the containment control of infrared to accurately locate and track assets and personnel within facilities.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524947
J. Aldridge
A Home Office Research and Development Project aimed at improving the operational effectiveness of closed circuit television (CCTV) safety and security systems was begun in April 1992. The main objectives were to: establish performance guidelines based on the picture quality and content needs of investigators and observers; develop methods of testing the performance of systems; and develop a method of analysing and documenting the needs of customers. This paper is primarily concerned with the last of these objectives which has led to the development of a structured analysis methodology for security problems. It outlines how such an operational requirement (OR) is produced. It illustrates its value at various stages of system acquisition and use: as a feasibility study tool, in the production of budgetary estimates, in pre-tender qualification, in system specification, for comparison of tenders, and in testing and commissioning. The paper indicates how the work is linked into the development of European standards and illustrates its wider application.
{"title":"Operational requirement analysis-a new approach to effective security","authors":"J. Aldridge","doi":"10.1109/CCST.1995.524947","DOIUrl":"https://doi.org/10.1109/CCST.1995.524947","url":null,"abstract":"A Home Office Research and Development Project aimed at improving the operational effectiveness of closed circuit television (CCTV) safety and security systems was begun in April 1992. The main objectives were to: establish performance guidelines based on the picture quality and content needs of investigators and observers; develop methods of testing the performance of systems; and develop a method of analysing and documenting the needs of customers. This paper is primarily concerned with the last of these objectives which has led to the development of a structured analysis methodology for security problems. It outlines how such an operational requirement (OR) is produced. It illustrates its value at various stages of system acquisition and use: as a feasibility study tool, in the production of budgetary estimates, in pre-tender qualification, in system specification, for comparison of tenders, and in testing and commissioning. The paper indicates how the work is linked into the development of European standards and illustrates its wider application.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123816351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524725
R. Clifton, B. G. Rich
Ported coaxial cable technology was first developed in the mid-1970's in response to a growing need for high performance covert sensors for perimeter intrusion detection. Technology development over the years has lead to a number of different sensor products that have seen wide-spread application. The original ported coaxial cable sensors went through several generations of improvements-primarily in response to experience gained from thousands of installations worldwide. These early generations were essentially refinements to the original products, intended to incrementally improve detection and invalid alarm performance and also to increase reliability. For perspective, this paper provides a very brief historical review of the ported coaxial cable sensors that have been commercialized to date and introduces two new and innovative sensor configurations that have recently emerged from research and development programs at Senstar Corporation. The first is a new "single-cable" networked sensor introduced to the market as S/spl infin/Trax which significantly reduces installation costs and complexity by eliminating the need for a second buried cable-while retaining the detection zone characteristics and performance established by the original sensors. The second is a "totally covert" configuration that takes advantage of recent advances in semiconductor technology to further simplify installation and also offers a growth path for joint domain and multiple sensor integration.
{"title":"Advances in ported coaxial cable technology","authors":"R. Clifton, B. G. Rich","doi":"10.1109/CCST.1995.524725","DOIUrl":"https://doi.org/10.1109/CCST.1995.524725","url":null,"abstract":"Ported coaxial cable technology was first developed in the mid-1970's in response to a growing need for high performance covert sensors for perimeter intrusion detection. Technology development over the years has lead to a number of different sensor products that have seen wide-spread application. The original ported coaxial cable sensors went through several generations of improvements-primarily in response to experience gained from thousands of installations worldwide. These early generations were essentially refinements to the original products, intended to incrementally improve detection and invalid alarm performance and also to increase reliability. For perspective, this paper provides a very brief historical review of the ported coaxial cable sensors that have been commercialized to date and introduces two new and innovative sensor configurations that have recently emerged from research and development programs at Senstar Corporation. The first is a new \"single-cable\" networked sensor introduced to the market as S/spl infin/Trax which significantly reduces installation costs and complexity by eliminating the need for a second buried cable-while retaining the detection zone characteristics and performance established by the original sensors. The second is a \"totally covert\" configuration that takes advantage of recent advances in semiconductor technology to further simplify installation and also offers a growth path for joint domain and multiple sensor integration.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134342714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524952
J.P. Dolt
Expert evidence is produced by having recourse to the forensic sciences. It helps to decide of the innocence or guilt of the judged by jurors of the French courts. It is necessary to study if those accused do have at their disposal enough guarantees when forensic sciences are used in criminal trials. Accused should at least benefit by two guarantees when expert evidence is used in front of French criminal courts: first the expertises are executed by specialists and so should be reliable: then, expertises should be normally controlled by the occasional magistrates (i.e. jurors). The reliability of expertises depends on the personal qualities of the expert (intelligence, professional conscientiousness, ability) and the method used for the valuation. Concerning jurors control on expertises, the study tries to show that jurors are not able to appraise expert evidence, because of their ignorance relating to forensic sciences. In fact, their conviction is determined by the pressure exerted on them by public opinion and by the impressions created in court by experts. All these remarks lead to conclude that it is necessary to suppress the jury institution in French criminal courts and to replace it by professional magistrates specialized in criminal law and forensic sciences.
{"title":"The place of expert evidence in French criminal courts","authors":"J.P. Dolt","doi":"10.1109/CCST.1995.524952","DOIUrl":"https://doi.org/10.1109/CCST.1995.524952","url":null,"abstract":"Expert evidence is produced by having recourse to the forensic sciences. It helps to decide of the innocence or guilt of the judged by jurors of the French courts. It is necessary to study if those accused do have at their disposal enough guarantees when forensic sciences are used in criminal trials. Accused should at least benefit by two guarantees when expert evidence is used in front of French criminal courts: first the expertises are executed by specialists and so should be reliable: then, expertises should be normally controlled by the occasional magistrates (i.e. jurors). The reliability of expertises depends on the personal qualities of the expert (intelligence, professional conscientiousness, ability) and the method used for the valuation. Concerning jurors control on expertises, the study tries to show that jurors are not able to appraise expert evidence, because of their ignorance relating to forensic sciences. In fact, their conviction is determined by the pressure exerted on them by public opinion and by the impressions created in court by experts. All these remarks lead to conclude that it is necessary to suppress the jury institution in French criminal courts and to replace it by professional magistrates specialized in criminal law and forensic sciences.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134316144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}