{"title":"Transportable, modular, high security vault utilizing pin connections","authors":"K. Linker","doi":"10.1109/CCST.1992.253734","DOIUrl":"https://doi.org/10.1109/CCST.1992.253734","url":null,"abstract":"A rapid deployment access delay system (RAPADS) has been designed to provide high security protection of valued assets. The author presents the RAPADS concept, design, fabrication, and construction. The system or vault is transportable, is modular, and utilizes a pin connection design. Individual panels are attached together to construct the vault. The pin connection allows for quick assembly and disassembly, and makes it possible to construct vaults of various sizes to meet a specific application. Because of the unique pin connection and overlapping joint arrangement, a sequence of assembly steps is required to assemble the vault. As a result, once the door is closed and locked, all pin connections are concealed and inaccessible. This provides a high level of protection in that no one panel or connection is vulnerable.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121022540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New solutions to perimeter protection and point access control","authors":"L. Bennett","doi":"10.1109/CCST.1992.253753","DOIUrl":"https://doi.org/10.1109/CCST.1992.253753","url":null,"abstract":"The author discusses new technologies available to detect approaches to a protected perimeter, intelligent systems for combining information from different detection systems to reduce false alarms by coincidence monitoring, and the use of biometrics and database systems to improve the speed and quality of access point systems. Experimental and trial data are presented to assess the cost benefits of new approaches. These data are related to the opportunities for improved total system performance and integrity.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122784888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verification of seismic detection system performance using the human heartbeat","authors":"E. Van Keuren, M. Rose, J. Knighten, J. Klein","doi":"10.1109/CCST.1992.253727","DOIUrl":"https://doi.org/10.1109/CCST.1992.253727","url":null,"abstract":"The need for calibration and validation of seismic measurements sometimes arises during data acquisition at field locations. The authors deal with the need for verification of signature acquisition system performance resulting from anomalous data acquired during seismic testing. A series of seismic tests was planned and initiated to acquire intruder and false/nuisance alarm signatures required for a security system design. The effort also included measurements of seismic signal propagation velocity under local soil conditions, required for investigation of a seismic beam forming system for intruder tracking. Measuring and recording system performance was verified through laboratory and field tests prior to shipment of the system. A unique offshoot of the program, the use of the human heartbeat as a calibration source, and subsequent investigation of this possibility are discussed.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128520157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technical applications of acoustoopic signal processing units","authors":"M. Klima, E. Kostal","doi":"10.1109/CCST.1992.253749","DOIUrl":"https://doi.org/10.1109/CCST.1992.253749","url":null,"abstract":"The authors consider the basic ideas of acoustooptic signal processing where an acoustooptic unit is used as a spatial modulator. The selection of applications is oriented for the purposes of the security technology. Some experimental results based upon mercurous halides are summarized. These experimentally verified bulk acoustooptic units have been applied as a part of a model of a spectrum analyzer and of a model of a correlator. The potential advantages of these materials were demonstrated.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133993500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gravitational field sensor for prediction of big seismic waves","authors":"J. Chiba, T. Obata","doi":"10.1109/CCST.1992.253730","DOIUrl":"https://doi.org/10.1109/CCST.1992.253730","url":null,"abstract":"The authors outline the gravitational field sensor for prediction of large seismic waves. They studied the turbulence of a Newtonian gravitational field due to large seismic waves and the detection of the turbulent field by an interferometric gravitational wave antenna. The cause of the turbulent field is the variation of the mass density in the ground by the waves. The warning system using the antenna is superior to that of a seismograph. When the seismograph and the antenna are set at the same place, for instance, 100 km away from the epicenter of a strong earthquake of M/sub S/ approximately 7, the seismograph does not respond until the arrival of the P-wave, but the antenna will respond to the gravitational field with about a 20-dB sensitivity 7 s before the arrival.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transparency from a system security engineering design perspective","authors":"D. Bruckner","doi":"10.1109/CCST.1992.253763","DOIUrl":"https://doi.org/10.1109/CCST.1992.253763","url":null,"abstract":"Transparency is an evolving principle of systems security engineering that can assist advanced technology systems (ATSs) in meeting operational objectives and performance requirements without the restrictions usually encountered in making a system secure. The transparency principle focuses on the ability of an ATS to function simultaneously in a variety of modes distributed across the overall system. This approach allows system security functions to be integrated and matrixed with the other functions rather than federated into exclusive hardware/software functions. The objective of systems security engineering then includes using the inherent capabilities of an advanced technology system to provide built-in layers of protection while at the same time distributing the securing functions across the system from its architecture to its components. In this way, ATS design can be optimized, costs can be contained, and its integrated security becomes transparent to users.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129537663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interception and interpretation of information from a subscriber loop phone line","authors":"P. A. Godwin, M. McShea","doi":"10.1109/CCST.1992.253769","DOIUrl":"https://doi.org/10.1109/CCST.1992.253769","url":null,"abstract":"The introduction of advanced error correcting protocols and developments in data compression and encryption have made the manual task of interpreting intercepted information nearly impossible. The seven layered open systems interconnection (OSI) model for communications system architecture is used as a basis to explore some of the many complex issues in data interpretation. The basic functions of each layer of the OSI model are discussed and examples of commonly encountered protocols used on the public switched telephone network are provided. The discussion is then extended to include issues of interpretation of the file level. One suggested solution to the problem of interpreting intercepted data is to develop a master database of all of the protocols that could be implemented at each level of a communications session. Such a database could be used to assign priorities for efforts to develop software tools for automating the interpretation function. This database could be used to evaluate and compare the various interception systems available in the market.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132427792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The vulnerability of computerized societies: a global concern","authors":"E. Orlandi","doi":"10.1109/CCST.1992.253743","DOIUrl":"https://doi.org/10.1109/CCST.1992.253743","url":null,"abstract":"Various aspects of the vulnerability of a firm or a government organization to computer viruses and computer crime are highlighted. On the basis of case histories a multidimensional representation is proposed. The emphasis is on the need for increasing vulnerability consciousness and to develop security awareness. Finally, the necessity of a global risk analysis technique is pointed out.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126756567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved protection for alarm communications systems","authors":"C. Jaeger, A.Y. Liang","doi":"10.1109/CCST.1992.253756","DOIUrl":"https://doi.org/10.1109/CCST.1992.253756","url":null,"abstract":"The alarm communications system can be thought of as consisting of five major components: alarm transmission, alarm displays and stations, alarm processing and software, line supervision, and other (e.g., enclosure protection). The authors illustrate a typical alarm communications system. The focus is on line supervision, particularly between the sensors and multiplexers. Modules from commercial vendors are being developed to provide enhanced line security (ELS) between the sensors and the data gathering panels or multiplexers (MUX). These modules are a promising new option for a physical protection system, and details concerning the evaluation and specific design requirements and functions are presented. The ELS systems currently being evaluated provide point-to-point protection between the sensor and MUX. The ELS systems were very reliable and required no maintenance once they were installed. The impact of encryption on the timely performance of the alarm communications system was evaluated.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":" 38","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114053455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced scientific detection of deception-ERP augmented polygraphy","authors":"G. M. Stone, E. Rothenheber","doi":"10.1109/CCST.1992.253758","DOIUrl":"https://doi.org/10.1109/CCST.1992.253758","url":null,"abstract":"The authors address the current state of polygraphy and the application of the brain's field potential data, specifically event-related potentials (ERPs), and pupillometrics to advanced scientific detection of deception and polygraphy. In the scientific detection of deception, the evoked potential of interest is commonly referred to as the P300. One means of assessing the efficacy of ERP augmented polygraphic systems is through the use of visual stimulation in the expanded guilty knowledge test process. In this empirical test configuration, multiple data channels are incorporated into the system, including eye movement and pupil diameter, as a control over the countermeasures, in the visual domain allowing for the correlation of ocular data, P300 response and those autonomic responses administered in conventional polygraphy, which include respiration, galvanic skin response, and pulse. Postprocessing of the data was performed by subjecting the collected information to a 7-Hz Fourier filter to remove the high frequency components of the data. Upon review and analysis of the data, some of the individual trails appeared to contain the P300 signal. Although these results were encouraging, the findings at this point are inconclusive, thus warranting additional study.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127022362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}