{"title":"HABSI: an expert system to reconstruct crime scene based on bloodstain interpretations","authors":"C. Kou, C.-h. Lin, F. Springsteel","doi":"10.1109/CCST.1992.253759","DOIUrl":"https://doi.org/10.1109/CCST.1992.253759","url":null,"abstract":"The authors present a new way to reconstruct a crime scene by using modern technology. They select bloodstain evidence which is based on Mark theory as the approach. Mark theory relates to the gathering, analyzing, and inferencing of physical evidence. The crime scene is reconstructed using the expert system HABSI, which uses a heuristic approach to bloodstain interpretation. EXSYS was used as an expert system shell to develop the system. The knowledge and the rule base are described. The goal was to represent the concept and implementation of fuzzy set theory to aid in the problem of reconstructing the crime scene. The prototype meets the initial requirements. Iterative refinements of the knowledge base through knowledge acquisition, knowledge representation, knowledge programming, and knowledge testing were conducted until user expectations were met.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114406172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated security and error control for communication networks using the McEliece cryptosystem","authors":"M. Alabbadi, S. Wicker","doi":"10.1109/CCST.1992.253739","DOIUrl":"https://doi.org/10.1109/CCST.1992.253739","url":null,"abstract":"The McEliece public key cryptosystem is modified to create an integrated security/error control system for digital communication networks. The security of the resulting system is examined in detail, with particular emphasis on the trade-off between error control and security. Cryptographic and communication measures of the performance of the system are established. The performance of the system for codewords of length 1024 is reported. A method is described for making the integrated system adaptive to changes in channel conditions.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134214395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. R. Williamson, R. Brooks, L. Moore, J. Williamson, M. McGee
{"title":"Remote sensing of personnel badge information using low-cost radar sensors","authors":"F. R. Williamson, R. Brooks, L. Moore, J. Williamson, M. McGee","doi":"10.1109/CCST.1992.253733","DOIUrl":"https://doi.org/10.1109/CCST.1992.253733","url":null,"abstract":"The authors describe a security surveillance system for monitoring the movement of personnel through halls and passageways while extracting encoded information from badges worn by the personnel passing the monitoring stations. This sensor technology is based on low-cost radar designs similar to the door openers used in many public buildings. The key to this surveillance concept is the badge design that incorporates a small, low-powered digital circuit used to modulate a radar reflector with digitally encoded information. This modulation pattern can be detected at a distance of several feet from the sensor to uniquely identify each badge. Since the radar sensor is also a good motion detector, passage of personnel not having an encoded badge can trigger alarm circuits and activate TV cameras to record the occurrence. They describe the unique monitoring concept, the coded reflector design, potential radar sensor configurations, signal processing algorithms, multiple target separation techniques, and badge coding concepts.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127252074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Spesivtsev, A.J. Krutjakov, V. Seregin, V. Sidorov, V. Wegner
{"title":"Software copy protection systems: structure, analysis, attacks","authors":"A. Spesivtsev, A.J. Krutjakov, V. Seregin, V. Sidorov, V. Wegner","doi":"10.1109/CCST.1992.253738","DOIUrl":"https://doi.org/10.1109/CCST.1992.253738","url":null,"abstract":"Copy protection systems are a reliable way to protect programmers' rights and to stimulate market development because they prevent unauthorized software use and copying. The main functions and structure of such systems are discussed. Possible attacks and breaking of copy protection systems are considered. One of the strongest systems, called the Iron Curtain, is described. Recommendations for selection of the right copy protection system are given.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127299122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Status of the video imaging system for detection, tracking, and assessment (VISDTA) scanning sensor program","authors":"D. Pritchard","doi":"10.1109/CCST.1992.253735","DOIUrl":"https://doi.org/10.1109/CCST.1992.253735","url":null,"abstract":"The video imaging system for detection, tracking, and assessment (VISDTA) is an automatic scanning, wide area, surveillance sensor with built-in change detection and video motion detection features. Recent modifications and performance improvements are described in terms of environmental and mechanical ruggedness, and detection probability. In addition, a VISDTA expansion is described that could convert many fixed-view cameras into change-detection sensors and further into video motion detection (VMD) devices. This modification proposes easy addition of VMD capability to many existing installations. A summary is included of the efforts to transfer VISDTA technology to industry.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116967919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The problem with security: public perception versus reality","authors":"D. Caskey","doi":"10.1109/CCST.1992.253764","DOIUrl":"https://doi.org/10.1109/CCST.1992.253764","url":null,"abstract":"The public perception of security, both of the requirements and the implementation, is often at odds with the judgment of security professionals. There is clearly a need to bridge the existing gulf, both by better education of the public, and by the security community gaining a better understanding of public policy, its constraints and limitations, and the effects of public perception. The author explores the topic through the examination of a case study. The example chosen was the Gulf War's effects on airport security in the US. He provides an analysis of the threat, as perceived by the Federal Aviation Administration (FAA) and the airports, the security measures imposed by the FAA, and their effects, on both public perception and in reducing vulnerabilities, from a technical security view. He also suggests that the lack of vulnerability analyses is a major problem in providing effective security.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127927017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A step-by-step shrouding methodology to protect against technology transfer","authors":"D. Kerner","doi":"10.1109/CCST.1992.253731","DOIUrl":"https://doi.org/10.1109/CCST.1992.253731","url":null,"abstract":"A methodological guide was developed to assist sensitive US solid rocket motor (SRM) facilities in understanding and meeting shrouding requirements for inspections by foreign nationals under the Strategic Arms Reduction Talks treaty verification regime. This study focused on shrouding requirements for items located in or near an area that might be subjected to intelligence gathering. The study examined the total facility environment and provided a systematic approach for determining appropriate shrouding materials and designs. It addressed current SRM facility shrouding capabilities, their possible shrouding requirements for intrusive inspections, and the cost and availability of shrouding materials. It also contained an analysis of alternative methods of shroud deployment. In combination with a complete facility sensitivities assessment, the methodology is intended to assist an SRM or other industrial facility in determining its specific shrouding requirements.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125681695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual Custody systems for improved house arrest and prison security","authors":"J. Coffin, F.J. Prokoski, R. Riedel","doi":"10.1109/CCST.1992.253760","DOIUrl":"https://doi.org/10.1109/CCST.1992.253760","url":null,"abstract":"The Virtual Custody electronic monitoring systems offer features beyond those of current electronic monitoring systems. Virtual Custody was designed to address concerns associated with house arrest, and to offer significant benefits for use in prisons. Systems have been developed for cooperative self-reporting and for automatic monitoring. The cooperative Virtual Custody system replaces current electronic monitoring systems, offering lower cost and additional information, while permitting broader use of remote monitoring with population segments currently excluded from consideration. By relying upon the offender to initiate a phone call from any location in response to a random alarm, the system can be used with individuals who have irregular work schedules, or who do not maintain a fixed address or phone line. The automatic Virtual Custody system provides remote tracking and monitoring capability on a continuous basis, and has particular immediate application to enhancing security and safety with maximum security prisons, and for career criminals or mentally retarded persons on probation or parole, or awaiting trial. The automatic system utilizes advances in geopositional navigational systems and in cellular telephones to provide continuous locating capability. The potential markets for Virtual Custody monitoring are quantified.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131504010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Custance, M. Horner, G. Leach, S.D. Peaty, K. H. Sage
{"title":"Optimising the performance of fence-mounted detection systems","authors":"N. Custance, M. Horner, G. Leach, S.D. Peaty, K. H. Sage","doi":"10.1109/CCST.1992.253746","DOIUrl":"https://doi.org/10.1109/CCST.1992.253746","url":null,"abstract":"The performance of fence-mounted perimeter intrusion detection systems (PIDSs) is examined. Performance specifications, the current performance of operational systems, fence and sensor types, and other factors affecting sensor performance are discussed, along with the implications of fence sensitivity variations and the measurement of these variations. The on-site optimization method (OSOM) is then introduced. Fence impact testers are a vital part of the OSOM. The OSOM addresses problems caused by different fence types, variations in sensitivity from zone to zone, and variability along each zone. The OSOM was developed for the optimization of a microphonic cable PIDS with digital signal processing. Adjusting the PIDS processing parameters to give a guaranteed level of detection, advantages over analog systems, and a comparison with off-site tuning are discussed.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133921116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A penetrationless secure container","authors":"D. Skogmo","doi":"10.1109/CCST.1992.253728","DOIUrl":"https://doi.org/10.1109/CCST.1992.253728","url":null,"abstract":"Secure containers are needed to protect the communication link between a data-gathering instrument and the device used to authenticate that instrument's reports. A container formed by a continuous, penetration-free glass envelope provides a robust solution. The author explores the problems involved with providing power and communications for such a penetrationless secure container. The design uses a split-core transformer to provide power and infrared light for communications. Only light and a magnetic field traverse the envelope. Performance data from a prototype system are presented. It has been demonstrated that power and communication may be provided to the interior of a sealed glass container without penetration of the container.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134593654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}