Maritime security poses daunting challenges of protecting thousands of potential targets, fixed and mobile, dispersed across US coasts and waterways. We describe an integrated approach to systematically assessing risks and prospective strategies for mitigating those risks. The maritime security risk analysis model (MSRAM) quantifies maritime risk in terms of threats, vulnerabilities, and consequences. We are extending MSRAM with novel "what-if" behavioral simulation software that projects the likely reduction of risks over time from adopting strategies for allocating existing security assets and investing in new security capabilities. Projected outcomes (and costs) can then be compared to identify the most robust strategies for mitigating risk. This decision support method can be re-applied over time as strategies are executed, to re-validate and adjust them in response to changing conditions and terrorist behaviors. This dynamic portfolio-based approach improves confidence, consistency, and quality of risk management decisions. It is extensible beyond the maritime domain to address other critical risk areas in homeland security.
{"title":"An Integrated Framework for Assessing and Mitigating Risks to Maritime Critical Infrastructure","authors":"R. Adler, J. Fuller","doi":"10.1109/THS.2007.370054","DOIUrl":"https://doi.org/10.1109/THS.2007.370054","url":null,"abstract":"Maritime security poses daunting challenges of protecting thousands of potential targets, fixed and mobile, dispersed across US coasts and waterways. We describe an integrated approach to systematically assessing risks and prospective strategies for mitigating those risks. The maritime security risk analysis model (MSRAM) quantifies maritime risk in terms of threats, vulnerabilities, and consequences. We are extending MSRAM with novel \"what-if\" behavioral simulation software that projects the likely reduction of risks over time from adopting strategies for allocating existing security assets and investing in new security capabilities. Projected outcomes (and costs) can then be compared to identify the most robust strategies for mitigating risk. This decision support method can be re-applied over time as strategies are executed, to re-validate and adjust them in response to changing conditions and terrorist behaviors. This dynamic portfolio-based approach improves confidence, consistency, and quality of risk management decisions. It is extensible beyond the maritime domain to address other critical risk areas in homeland security.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127080612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Moorman, A. Robinson, R. Manginell, A. Tappan, K. Linker
Accurate, periodic calibration is required to operate IMS, GC, and portal security systems with maximum efficiency, surety, and operator confidence. To this end, we are presently developing a microfabricated device for on-demand calibration of fieldable contraband detection instruments. Using robotically-assisted picoliter dispensing methods, precise nanogram or larger amounts of calibration compound(s) are placed on micron-sized bridge structures. Resistively heating these structures delivers precisely quantified low-levels of calibration compounds to the detector systems. This provides reliable calibration for identification and quantification of explosives, narcotics, and other contraband.
{"title":"Microfabricated Chip for Calibration of Field Instruments","authors":"M. Moorman, A. Robinson, R. Manginell, A. Tappan, K. Linker","doi":"10.1109/THS.2007.370016","DOIUrl":"https://doi.org/10.1109/THS.2007.370016","url":null,"abstract":"Accurate, periodic calibration is required to operate IMS, GC, and portal security systems with maximum efficiency, surety, and operator confidence. To this end, we are presently developing a microfabricated device for on-demand calibration of fieldable contraband detection instruments. Using robotically-assisted picoliter dispensing methods, precise nanogram or larger amounts of calibration compound(s) are placed on micron-sized bridge structures. Resistively heating these structures delivers precisely quantified low-levels of calibration compounds to the detector systems. This provides reliable calibration for identification and quantification of explosives, narcotics, and other contraband.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126936814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The inability to seamlessly merge technologies on a flexible, versatile platform has severely limited the development of a truly integrated checkpoint screening system that can effectively detect all explosives and other threats while maintaining throughput demands. L-3 Security and Detection Systems, Inc. is developing a fully integrated checkpoint security solution that answers this challenge with stable, blended, state-of-the-art inspection technologies that dramatically increase the probability of threat detection. The system provides state-of-the-art technology integrated under one umbrella. Fused sensor data and "plug and play" elements combine to allow maximum user flexibility in meeting both customer and regulator checkpoint objectives.
{"title":"Checkpoint Technology Developments: An Integrated Solution","authors":"W. Weller","doi":"10.1109/THS.2007.370037","DOIUrl":"https://doi.org/10.1109/THS.2007.370037","url":null,"abstract":"The inability to seamlessly merge technologies on a flexible, versatile platform has severely limited the development of a truly integrated checkpoint screening system that can effectively detect all explosives and other threats while maintaining throughput demands. L-3 Security and Detection Systems, Inc. is developing a fully integrated checkpoint security solution that answers this challenge with stable, blended, state-of-the-art inspection technologies that dramatically increase the probability of threat detection. The system provides state-of-the-art technology integrated under one umbrella. Fused sensor data and \"plug and play\" elements combine to allow maximum user flexibility in meeting both customer and regulator checkpoint objectives.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"62 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116361325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A signature-based radiation technique for detecting chemical explosive is described. Radiation techniques offer the advantage that they can operate at standoff, although rapid detection of explosives at safe standoff distances remains problematic. The technique we describe differs from the major nuclear approaches, which involve imaging (using either photon or neutron interrogation) and/or quantitative analysis (for instance by use of prompt-and inelastic-scatter gamma-ray production based on neutron interrogation). Our technique utilizes both photon and neutron interrogation but avoids imaging or quantitative analysis. The technique, which we call signature-based radiation scanning (SBRS), limits itself to detecting whether a target contains an explosive and does not attempt to characterize the internals of a target further. A template-matching technique is employed, which provides a single figure-of-merit whose value is used to distinguish between safe targets and those containing explosives. Both simulation and experiment have been used to verify the validity of SBRS.
{"title":"Radiation Interrogation Using Signature Analysis for Detection of Chemical Explosives","authors":"W. L. Dunn, R. Brewer, K. Loschke, J. Lowrey","doi":"10.1109/THS.2007.370011","DOIUrl":"https://doi.org/10.1109/THS.2007.370011","url":null,"abstract":"A signature-based radiation technique for detecting chemical explosive is described. Radiation techniques offer the advantage that they can operate at standoff, although rapid detection of explosives at safe standoff distances remains problematic. The technique we describe differs from the major nuclear approaches, which involve imaging (using either photon or neutron interrogation) and/or quantitative analysis (for instance by use of prompt-and inelastic-scatter gamma-ray production based on neutron interrogation). Our technique utilizes both photon and neutron interrogation but avoids imaging or quantitative analysis. The technique, which we call signature-based radiation scanning (SBRS), limits itself to detecting whether a target contains an explosive and does not attempt to characterize the internals of a target further. A template-matching technique is employed, which provides a single figure-of-merit whose value is used to distinguish between safe targets and those containing explosives. Both simulation and experiment have been used to verify the validity of SBRS.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128584161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
From an academic experience spent endeavoring to write code and assign design methodology for a XILINX University Program (XUP) FPGA, participants received a glimpse at future intelligent infrastructure design and what it could mean towards improving public safety and homeland security. Participants also received a reality-based appreciation about practical hurdles in creating code for an FPGA (PSoC) and current limitations in preventing engineering disciplines to integrate efforts and unleash the potential powers of ambient intelligence.
{"title":"Configurable Sensor Networks: An Academic Experience Provides a Future Glimpse at Improved Infrastructure Safety and Security (May 2007)","authors":"D. Ferriere, L.E. Long, T. Jankowski","doi":"10.1109/THS.2007.370057","DOIUrl":"https://doi.org/10.1109/THS.2007.370057","url":null,"abstract":"From an academic experience spent endeavoring to write code and assign design methodology for a XILINX University Program (XUP) FPGA, participants received a glimpse at future intelligent infrastructure design and what it could mean towards improving public safety and homeland security. Participants also received a reality-based appreciation about practical hurdles in creating code for an FPGA (PSoC) and current limitations in preventing engineering disciplines to integrate efforts and unleash the potential powers of ambient intelligence.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125461846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Over the course of the past year, millimeter wave-based (MMW) imaging systems have entered the market, been deployed, and been evaluated in various trial applications. The attractiveness of millimeter wave solutions is that they combine an excellent combination of technology maturity, low cost commercialization, and important performance attributes. These characteristics make them uniquely suited for many important types of concealed weapons and contraband threats, supporting a volume of potential applications. This paper will discuss the state of MMW imaging and likely forward trends.
{"title":"Millimeter Waves: The Evolving Scene","authors":"R. Howald, G. Clark, J. Hubert, D. Ammar","doi":"10.1109/THS.2007.370051","DOIUrl":"https://doi.org/10.1109/THS.2007.370051","url":null,"abstract":"Over the course of the past year, millimeter wave-based (MMW) imaging systems have entered the market, been deployed, and been evaluated in various trial applications. The attractiveness of millimeter wave solutions is that they combine an excellent combination of technology maturity, low cost commercialization, and important performance attributes. These characteristics make them uniquely suited for many important types of concealed weapons and contraband threats, supporting a volume of potential applications. This paper will discuss the state of MMW imaging and likely forward trends.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114234765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Structural health monitoring is desirable in many fields to provide a means of damage detection on a variety of structures. Unfortunately, the ability to equip structures with health monitoring systems is limited by the development of adequate hardware. Previously, prototypes using the impedance-based health monitoring method have been developed to lay a foundation for permanent structural damage detection. These prototypes served their purposes, but has shortcomings such that large size and high power consumption. In this paper, all-digital excitation and sensing techniques are developed to reduce both the size and power dissipation. The digital techniques are implemented onto a new prototype, which achieves substantial reduction in size and power consumption. Validation of the new hardware on a representative structure is presented and compared with traditional techniques for structural health monitoring.
{"title":"An All-Digital Low-Power Structural Health Monitoring System","authors":"Jina Kim, B. Grisso, D. Ha, D. Inman","doi":"10.1109/THS.2007.370032","DOIUrl":"https://doi.org/10.1109/THS.2007.370032","url":null,"abstract":"Structural health monitoring is desirable in many fields to provide a means of damage detection on a variety of structures. Unfortunately, the ability to equip structures with health monitoring systems is limited by the development of adequate hardware. Previously, prototypes using the impedance-based health monitoring method have been developed to lay a foundation for permanent structural damage detection. These prototypes served their purposes, but has shortcomings such that large size and high power consumption. In this paper, all-digital excitation and sensing techniques are developed to reduce both the size and power dissipation. The digital techniques are implemented onto a new prototype, which achieves substantial reduction in size and power consumption. Validation of the new hardware on a representative structure is presented and compared with traditional techniques for structural health monitoring.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133599888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The protection of critical infrastructure is a growing concern within the transportation industry. Raytheon is developing a system architecture and design for a perimeter security system that specifically addresses this issue for large facilities such as airports, seaports and rail facilities. The architecture uses the DoD's Architecture Framework guidelines. It employs a multi-sensor approach, including ground surveillance radars and cameras, to detect, assess and track perimeter incursions. It is designed to operate 24/7 in all weather conditions. A command and control center provides timely and accurate situational awareness to facility security personnel responsible for monitoring and managing incidents. Mobile communications also provide situational awareness to first responders in the field. The architecture supports integration with existing security systems, such as access control and closed circuit television, to centralize security monitoring for the entire facility. This architecture is the basis for the Port Authority of New York and New Jersey's Perimeter Intrusion Detection System for four airports, including John F. Kennedy International. Raytheon's system engineering process as applied to the perimeter security application is described, with focus on the key early process phases of threat analysis, operational concept generation, system requirements analysis, and system architecture and design development. Key technical parameters, including probability of detection and nuisance alarm rate, that drive the system design and cost are also discussed. Raytheon has found that the quality of the system engineering effort directly determines the quality of the resulting system and its ability to satisfy the customer's mission needs.
{"title":"Integrated Perimeter Security System","authors":"S. Hennin, G. Germana, L. Garcia","doi":"10.1109/THS.2007.370022","DOIUrl":"https://doi.org/10.1109/THS.2007.370022","url":null,"abstract":"The protection of critical infrastructure is a growing concern within the transportation industry. Raytheon is developing a system architecture and design for a perimeter security system that specifically addresses this issue for large facilities such as airports, seaports and rail facilities. The architecture uses the DoD's Architecture Framework guidelines. It employs a multi-sensor approach, including ground surveillance radars and cameras, to detect, assess and track perimeter incursions. It is designed to operate 24/7 in all weather conditions. A command and control center provides timely and accurate situational awareness to facility security personnel responsible for monitoring and managing incidents. Mobile communications also provide situational awareness to first responders in the field. The architecture supports integration with existing security systems, such as access control and closed circuit television, to centralize security monitoring for the entire facility. This architecture is the basis for the Port Authority of New York and New Jersey's Perimeter Intrusion Detection System for four airports, including John F. Kennedy International. Raytheon's system engineering process as applied to the perimeter security application is described, with focus on the key early process phases of threat analysis, operational concept generation, system requirements analysis, and system architecture and design development. Key technical parameters, including probability of detection and nuisance alarm rate, that drive the system design and cost are also discussed. Raytheon has found that the quality of the system engineering effort directly determines the quality of the resulting system and its ability to satisfy the customer's mission needs.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116031271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Effective coordination of public safety functions requires high-quality regional data networking that connects many municipal, state, federal and other agencies. One approach would be to build a massive new network and invite (or force) everyone onto it. This paper describes an alternative approach: an ongoing project in the Boston area create a regional network by leveraging existing networking assets and other public safety investments. A pilot project is complete, and growth of the network is underway. The model on which PSnet is based - private and public entities at local, state, and federal levels collaborating to create and operate network infrastructure - has been proven successful from a technical, operational, and business point of view in other domains among other communities such as research and higher education. Creating PSnet is as much about creating the necessary governance and other human and organizational infrastructure as it is about the network itself.
{"title":"PSnet: A Collaborative, Bottom-up Approach To Building a Regional Public Safety Network","authors":"G. Fosque","doi":"10.1109/THS.2007.370010","DOIUrl":"https://doi.org/10.1109/THS.2007.370010","url":null,"abstract":"Effective coordination of public safety functions requires high-quality regional data networking that connects many municipal, state, federal and other agencies. One approach would be to build a massive new network and invite (or force) everyone onto it. This paper describes an alternative approach: an ongoing project in the Boston area create a regional network by leveraging existing networking assets and other public safety investments. A pilot project is complete, and growth of the network is underway. The model on which PSnet is based - private and public entities at local, state, and federal levels collaborating to create and operate network infrastructure - has been proven successful from a technical, operational, and business point of view in other domains among other communities such as research and higher education. Creating PSnet is as much about creating the necessary governance and other human and organizational infrastructure as it is about the network itself.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"26-27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a non-specific detection system for quickly screening toxic and harmful contaminants in food products by utilizing the properties of naturally occurring bioluminescence in selected living bacteria. The goal of the project was to evaluate the effectiveness of using luminescent bacteria as "canaries" for rapid non-specific detection of toxic contaminants for homeland food protection and defense. Vibro fischeri was used as the specific biological sensor in this study. The bacteria was grown in marine broth and maintained between 22 and 25degC for optimal growth. Cultures were used to determine the presence of a surrogate toxicant, in this case, sodium hypochlorite (bleach) in various concentrations. Initial results show that 10% bleach quenches light emission immediately upon contact with the bacteria contained in 3 food matrices, namely: skim milk, 2% milk, and drinking water. This naturally occurring biological sensor would be useful in providing an inexpensive, highly renewable early warning system of a potentially catastrophic event. A successful system would enhance early surveillance against any intentional attack on the US food supply, including drinking water. Even in the absence of a bioterrorism event, the biological sensor would still be useful in control measures against naturally occurring or sanitation-constrained toxic substances.
{"title":"Bioluminescent Sensors for Onsite Non-specific Screening of Toxic Agents in Food and Water","authors":"E. Alocilja, T. McLean","doi":"10.1109/THS.2007.370046","DOIUrl":"https://doi.org/10.1109/THS.2007.370046","url":null,"abstract":"This paper presents a non-specific detection system for quickly screening toxic and harmful contaminants in food products by utilizing the properties of naturally occurring bioluminescence in selected living bacteria. The goal of the project was to evaluate the effectiveness of using luminescent bacteria as \"canaries\" for rapid non-specific detection of toxic contaminants for homeland food protection and defense. Vibro fischeri was used as the specific biological sensor in this study. The bacteria was grown in marine broth and maintained between 22 and 25degC for optimal growth. Cultures were used to determine the presence of a surrogate toxicant, in this case, sodium hypochlorite (bleach) in various concentrations. Initial results show that 10% bleach quenches light emission immediately upon contact with the bacteria contained in 3 food matrices, namely: skim milk, 2% milk, and drinking water. This naturally occurring biological sensor would be useful in providing an inexpensive, highly renewable early warning system of a potentially catastrophic event. A successful system would enhance early surveillance against any intentional attack on the US food supply, including drinking water. Even in the absence of a bioterrorism event, the biological sensor would still be useful in control measures against naturally occurring or sanitation-constrained toxic substances.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122371586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}