Government agencies globally are facing problems like illegal immigration, terrorism, and disease diagnostics and control. Solutions to these problems rely heavily on collaborating organizations' ability to effectively and efficiently share not only data but also knowledge embedded in organizational and inter-organizational policies, regulations, data and security constraints, processes and procedures. The United States Department of Agriculture has launched a multi-year national project to build the National Plant Diagnostic Network (NPDN) for strengthening the homeland security protection of food and agriculture by connecting five regional plant diagnostic centers with a national center. Complementing this effort, our research team has been developing a web-based, distributed system for event-triggered knowledge sharing among NPDN organizations. We capture multi-faceted knowledge using three types of rules and rule structures. A user-friendly interface is provided for collaborating organizations to define events of interest as well as knowledge rules and publish them in a global registry for browsing, querying, event subscription and notification, and processing. Event data are the dots that can be connected across organizational boundaries through the interoperation of knowledge rules and rule structures.
{"title":"A Distributed Event-triggered Knowledge Sharing System for Agricultural Homeland Security","authors":"S. Degwekar, J. DePree, H. Beck, S. Su","doi":"10.1109/THS.2007.370042","DOIUrl":"https://doi.org/10.1109/THS.2007.370042","url":null,"abstract":"Government agencies globally are facing problems like illegal immigration, terrorism, and disease diagnostics and control. Solutions to these problems rely heavily on collaborating organizations' ability to effectively and efficiently share not only data but also knowledge embedded in organizational and inter-organizational policies, regulations, data and security constraints, processes and procedures. The United States Department of Agriculture has launched a multi-year national project to build the National Plant Diagnostic Network (NPDN) for strengthening the homeland security protection of food and agriculture by connecting five regional plant diagnostic centers with a national center. Complementing this effort, our research team has been developing a web-based, distributed system for event-triggered knowledge sharing among NPDN organizations. We capture multi-faceted knowledge using three types of rules and rule structures. A user-friendly interface is provided for collaborating organizations to define events of interest as well as knowledge rules and publish them in a global registry for browsing, querying, event subscription and notification, and processing. Event data are the dots that can be connected across organizational boundaries through the interoperation of knowledge rules and rule structures.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133579004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Lo Presti, B. Milbrath, M. Tardiff, S. Hartley-McBride
Algorithms based on time-series analysis techniques were explored for maximizing the effectiveness of pass-through radiation portal monitors for detection of special nuclear material (SNM). Time-series properties of vehicle count profiles such as stationarity and autocorrelation within energy windows were characterized. Vehicle count profiles were nonstationary but were found to be made stationary by first-differencing. Autocorrelation functions showed consistent differences between NORM alarm and non-alarm vehicles. Injection studies were performed to assess the performance of time-domain detection algorithms based on stationarity tests and on the CUSUM change-point detection test. Results indicated possible roles for detection algorithms based on statistical process control and on time series concepts.
{"title":"Results From Application of Time Series Concepts to Vehicle Gamma Count Profiles","authors":"C. Lo Presti, B. Milbrath, M. Tardiff, S. Hartley-McBride","doi":"10.1109/THS.2007.370034","DOIUrl":"https://doi.org/10.1109/THS.2007.370034","url":null,"abstract":"Algorithms based on time-series analysis techniques were explored for maximizing the effectiveness of pass-through radiation portal monitors for detection of special nuclear material (SNM). Time-series properties of vehicle count profiles such as stationarity and autocorrelation within energy windows were characterized. Vehicle count profiles were nonstationary but were found to be made stationary by first-differencing. Autocorrelation functions showed consistent differences between NORM alarm and non-alarm vehicles. Injection studies were performed to assess the performance of time-domain detection algorithms based on stationarity tests and on the CUSUM change-point detection test. Results indicated possible roles for detection algorithms based on statistical process control and on time series concepts.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133577175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When attacks or natural disasters occur, emergency response organizations rely on Tactical Operations Center for situation awareness. Currently, there is a lack of connectivity and real-time data management across all agencies. Without a technology to support the harvesting and dissemination of real-time data relevant to each agent's roles and responsibilities, inter-agency communication can often be difficult and chaotic. Whether at the TOC or on-site, the combined use of fixed and mobile devices to access a common relevant picture makes each agent into an active node; as more nodes are networked in, the big picture of what's happening becomes increasingly clearer. This paper discusses how transmedial technologies can transform each agent into a network of nodes for collaborative situation awareness.
{"title":"Improving Collaborative Situation Awareness with Transmedial Infrastructure","authors":"V.S. Wu, F. Velander","doi":"10.1109/THS.2007.370060","DOIUrl":"https://doi.org/10.1109/THS.2007.370060","url":null,"abstract":"When attacks or natural disasters occur, emergency response organizations rely on Tactical Operations Center for situation awareness. Currently, there is a lack of connectivity and real-time data management across all agencies. Without a technology to support the harvesting and dissemination of real-time data relevant to each agent's roles and responsibilities, inter-agency communication can often be difficult and chaotic. Whether at the TOC or on-site, the combined use of fixed and mobile devices to access a common relevant picture makes each agent into an active node; as more nodes are networked in, the big picture of what's happening becomes increasingly clearer. This paper discusses how transmedial technologies can transform each agent into a network of nodes for collaborative situation awareness.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129816768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As technologies continue to develop and test for deployment in marine mass transit applications, industry and government strive to make successful products that will provide cost effective solutions. These solutions will most probably emerge from a fusion of several technologies to create a more complete, multi-threat coverage. Many labor intensive technologies will be replaced by automated, accurate systems of the future. Until then, effective compensatory measures for technology gaps will continue to be the interim solution in deterring a significant security event in the ferry transport system.
{"title":"Passenger and Baggage Security Screening Challenges in Marine Mass Transit","authors":"R. Hoaglund","doi":"10.1109/THS.2007.370055","DOIUrl":"https://doi.org/10.1109/THS.2007.370055","url":null,"abstract":"As technologies continue to develop and test for deployment in marine mass transit applications, industry and government strive to make successful products that will provide cost effective solutions. These solutions will most probably emerge from a fusion of several technologies to create a more complete, multi-threat coverage. Many labor intensive technologies will be replaced by automated, accurate systems of the future. Until then, effective compensatory measures for technology gaps will continue to be the interim solution in deterring a significant security event in the ferry transport system.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128239064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Video content analytics effectively identifies threats in video surveillance camera feeds. These behaviors include person/vehicle entering restricted zone, counter-flow detection, loitering, object left behind, and others. In order to provide enhanced security, events need to be integrated with a command and control system capable of effectively responding to hundreds of events per day in a busy, critical infrastructure facility. We describe a novel system -NerveCenter - that links analytic events with command center data wall camera pop-ups on alarm, extended notification tools that send multi-modal alerts, acknowledgement tracking, 911 computer aided dispatch (CAD), and geo-coded mapping tools that give operators a tactical map. The usability of these tools is discussed along with how to provide situational awareness and a common operating picture to operators and first responders.
{"title":"Video Content Analysis with Effective Response","authors":"D. Abrams, S. McDowall","doi":"10.1109/THS.2007.370020","DOIUrl":"https://doi.org/10.1109/THS.2007.370020","url":null,"abstract":"Video content analytics effectively identifies threats in video surveillance camera feeds. These behaviors include person/vehicle entering restricted zone, counter-flow detection, loitering, object left behind, and others. In order to provide enhanced security, events need to be integrated with a command and control system capable of effectively responding to hundreds of events per day in a busy, critical infrastructure facility. We describe a novel system -NerveCenter - that links analytic events with command center data wall camera pop-ups on alarm, extended notification tools that send multi-modal alerts, acknowledgement tracking, 911 computer aided dispatch (CAD), and geo-coded mapping tools that give operators a tactical map. The usability of these tools is discussed along with how to provide situational awareness and a common operating picture to operators and first responders.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115243088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A standard 48-inch two-bulb fluorescent lamp was modified to be used as a capacitive sensing system. The lamp sensor system demonstrated the ability to detect the presence and motion of human targets at ranges of up to 10 feet between the lamp and the closest edge of the target. Proof of concept was also demonstrated for metal detection by demonstrating the ability to differentiate between a human target and the same human target carrying conducting (metallic) objects. The lamp sensor shows potential for low-cost and widespread discreet security monitoring and biometric surveillance.
{"title":"A Modified Fluorescent Lamp for Discreet Biometric Surveillance","authors":"J. Cooley, A. Avestruz, S. Leeb","doi":"10.1109/THS.2007.370050","DOIUrl":"https://doi.org/10.1109/THS.2007.370050","url":null,"abstract":"A standard 48-inch two-bulb fluorescent lamp was modified to be used as a capacitive sensing system. The lamp sensor system demonstrated the ability to detect the presence and motion of human targets at ranges of up to 10 feet between the lamp and the closest edge of the target. Proof of concept was also demonstrated for metal detection by demonstrating the ability to differentiate between a human target and the same human target carrying conducting (metallic) objects. The lamp sensor shows potential for low-cost and widespread discreet security monitoring and biometric surveillance.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127469169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless sensor networks must be designed to be both secure and reliable, especially when they are used in national security and safety-critical applications. In this paper, we propose a new mechanism, called MVMP (multi-version multi-path), which integrates data segmentation, Forward Error Correction coding, multiple paths, and multiple versions of cryptographic algorithms for achieving both secure and reliable data transmission in sensor networks. The MVMP is also energy-aware in that each piece of the original data will be encrypted by a single encryption algorithm once, and it will be transmitted only once. The proposed MVMP mechanism is compared with existing mechanisms, in particular, the secret sharing mechanism using performance criteria including redundancy level, self-healing capability, and security.
{"title":"A New Mechanism for Achieving Secure and Reliable Data Transmission in Wireless Sensor Networks","authors":"Ruiping Ma, L. Xing, Howard E. Michel","doi":"10.1109/THS.2007.370058","DOIUrl":"https://doi.org/10.1109/THS.2007.370058","url":null,"abstract":"Wireless sensor networks must be designed to be both secure and reliable, especially when they are used in national security and safety-critical applications. In this paper, we propose a new mechanism, called MVMP (multi-version multi-path), which integrates data segmentation, Forward Error Correction coding, multiple paths, and multiple versions of cryptographic algorithms for achieving both secure and reliable data transmission in sensor networks. The MVMP is also energy-aware in that each piece of the original data will be encrypted by a single encryption algorithm once, and it will be transmitted only once. The proposed MVMP mechanism is compared with existing mechanisms, in particular, the secret sharing mechanism using performance criteria including redundancy level, self-healing capability, and security.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124137515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Public safety officers need current, accurate and complete information to maintain the security of their communities. Existing communications systems for public safety officers consist of analog and digital radios, supplemented with cell phone communications. Dispatchers with a need to broadcast information can only do so via voice. Small data packets can be exchanged via point-to-point methods with modern digital radios, but no data broadcast exists for public safety communications. Broadcasting images, audio and text to officers in the field will offer a better collection of information necessary to make critical, time-sensitive public safety decisions. Live updates to in-vehicle databases and computer systems will provide officers with critical, up-to-the-minute information. Working with New Hampshire Public Television and the National Institute of Justice, we are researching a system to utilize excess bandwidth available in the public television broadcast spectrum. The system is to be implemented using the onboard data and car management system known as Project54TM. The use of this excess bandwidth for the delivery of digital data in a one-way, high-speed, broadcast stream is called datacasting. While datacasting has existed since the initial draft ATSC standards defining digital television, few locations have installed full datacasting capabilities, and no other datacasting effort has implemented a mobile, two-way datacasting system. This paper will outline the design of the datacasting environment for the New Hampshire Department of Safety, the results of field tests performed by 10 State Police vehicles collecting data during routine public safety patrols, and the status of the two-way datacasting implementation.
{"title":"Systems Engineering of Datacasting for Public Safety Vehicles","authors":"S. Valcourt, K. Chamberlin, B. McMahon, A. Kun","doi":"10.1109/THS.2007.370018","DOIUrl":"https://doi.org/10.1109/THS.2007.370018","url":null,"abstract":"Public safety officers need current, accurate and complete information to maintain the security of their communities. Existing communications systems for public safety officers consist of analog and digital radios, supplemented with cell phone communications. Dispatchers with a need to broadcast information can only do so via voice. Small data packets can be exchanged via point-to-point methods with modern digital radios, but no data broadcast exists for public safety communications. Broadcasting images, audio and text to officers in the field will offer a better collection of information necessary to make critical, time-sensitive public safety decisions. Live updates to in-vehicle databases and computer systems will provide officers with critical, up-to-the-minute information. Working with New Hampshire Public Television and the National Institute of Justice, we are researching a system to utilize excess bandwidth available in the public television broadcast spectrum. The system is to be implemented using the onboard data and car management system known as Project54TM. The use of this excess bandwidth for the delivery of digital data in a one-way, high-speed, broadcast stream is called datacasting. While datacasting has existed since the initial draft ATSC standards defining digital television, few locations have installed full datacasting capabilities, and no other datacasting effort has implemented a mobile, two-way datacasting system. This paper will outline the design of the datacasting environment for the New Hampshire Department of Safety, the results of field tests performed by 10 State Police vehicles collecting data during routine public safety patrols, and the status of the two-way datacasting implementation.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132846371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Classical risk-based or game theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable for security risks. Additionally, these models suffer from serious deficiencies when they are applied to software-intensive, complex engineering systems. Recent work in the area of system safety engineering has led to the development of a new accident model for system safety that acknowledges the dynamic complexity of accidents. System-theoretic accident models and processes (STAMP) applies principles from control theory to enforce constraints on hazards and thereby prevent accidents. Appreciating the similarities between safety and security while still acknowledging the differences, this paper introduces the use of STAMP to security problems. In particular, it is applied to identify and mitigate the threats that could emerge in critical infrastructure systems such as the air transportation network.
{"title":"Apply STAMP to Critical Infrastructure Protection","authors":"Joseph R. Laracy, N. Leveson","doi":"10.1109/THS.2007.370048","DOIUrl":"https://doi.org/10.1109/THS.2007.370048","url":null,"abstract":"Classical risk-based or game theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable for security risks. Additionally, these models suffer from serious deficiencies when they are applied to software-intensive, complex engineering systems. Recent work in the area of system safety engineering has led to the development of a new accident model for system safety that acknowledges the dynamic complexity of accidents. System-theoretic accident models and processes (STAMP) applies principles from control theory to enforce constraints on hazards and thereby prevent accidents. Appreciating the similarities between safety and security while still acknowledging the differences, this paper introduces the use of STAMP to security problems. In particular, it is applied to identify and mitigate the threats that could emerge in critical infrastructure systems such as the air transportation network.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121681455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ultra-wide bandwidth (UWB) radar can probably detect an intruder by virtue of his/her heartbeat. Ordinarily used for detection of buried objects, UWB radar can measure the Doppler frequency shift caused by the radar impinging on blood pumped in the heart to infer the presence of a human in situations where other sensors cannot, or to supplement other sensors. The heart is divided into four chambers. Two are called ventricles. They contract thereby ejecting blood at high speed. Detection improves as the intruder becomes increasingly agitated or runs. Pumping action of the heart is modeled mathematically.
{"title":"Intrusion Detection by Ultra-Wide Bandwidth Radar","authors":"N. J. Meyerhoff","doi":"10.1109/THS.2007.370024","DOIUrl":"https://doi.org/10.1109/THS.2007.370024","url":null,"abstract":"Ultra-wide bandwidth (UWB) radar can probably detect an intruder by virtue of his/her heartbeat. Ordinarily used for detection of buried objects, UWB radar can measure the Doppler frequency shift caused by the radar impinging on blood pumped in the heart to infer the presence of a human in situations where other sensors cannot, or to supplement other sensors. The heart is divided into four chambers. Two are called ventricles. They contract thereby ejecting blood at high speed. Detection improves as the intruder becomes increasingly agitated or runs. Pumping action of the heart is modeled mathematically.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115036139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}