{"title":"A framework for supplier-supply chain risk management: Tradespace factors to achieve risk reduction — Return on investment","authors":"Serena Chan, Gregory N. Larsen","doi":"10.1109/THS.2010.5655102","DOIUrl":"https://doi.org/10.1109/THS.2010.5655102","url":null,"abstract":"The growing trend in information and communications technology (ICT) globalization and outsourcing provides opportunities for adversaries to attack the supply chains of critical information systems and networks in order to gain unauthorized access to data, alter data, disrupt operations, or interrupt communications by inserting malicious code into or otherwise corrupting components; or to obtain knowledge of the uses and users of systems. A challenging issue is the ability to assure that articles of supply and the suppliers can be trusted to do only that which is expected or specified and to do so reliably and dependably. This paper describes a framework for discovering, defining, learning, and establishing capabilities to manage the risks of suppliers and supply chains of ICT.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134474443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy aware routing algorithm for WSN applications in border surveillance","authors":"Yuping Dong, Hwa Chang, Zhongjian Zou, Sai Tang","doi":"10.1109/THS.2010.5654979","DOIUrl":"https://doi.org/10.1109/THS.2010.5654979","url":null,"abstract":"Wireless Sensor Networks (WSNs) are widely used in various applications for tracking or surveillance purposes. Border security monitoring and terrorist attack prevention are just two of many crucial homeland security applications which rely upon WSN technologies. In these applications, a great amount of sensors powered by batteries are deployed in a particular region. They detect events, process and relay data to the sink node at the base station. Power conservation is critical to these sensors. In this paper, we propose a routing algorithm which separates the sensor nodes to several scheduling sets and keeps track of the energy level of each sensor. This algorithm balances power consumption among sensors, and therefore prolongs the network lifetime. Simulation results verify that our algorithm outperforms the EECCR algorithm proposed in [1].","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134322114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Mlcak, D. Doppalapudi, Paul Pyzowski, P. Gwynne, Scott Purchase, Jeffrey Bridgham, Gerald Schultz, M. Skelton, David Pelletier, H. Tuller
{"title":"MEMS-based gravimetric sensors for explosives detection","authors":"R. Mlcak, D. Doppalapudi, Paul Pyzowski, P. Gwynne, Scott Purchase, Jeffrey Bridgham, Gerald Schultz, M. Skelton, David Pelletier, H. Tuller","doi":"10.1109/THS.2010.5655033","DOIUrl":"https://doi.org/10.1109/THS.2010.5655033","url":null,"abstract":"A compact, rapid system for trace detection of explosives using MEMS-bases resonant structures is described. Various software algorithms are used to eliminate problems in previous implementations of array-based detectors. Results for detection of trace levels of explosives and other threat agents are given.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risks of unrecognized commonalities in information technology supply chains","authors":"C. Axelrod, Ph. D. Delta","doi":"10.1109/THS.2010.5654970","DOIUrl":"https://doi.org/10.1109/THS.2010.5654970","url":null,"abstract":"In this paper we examine the interdependencies and common points of failure (and attack) that plague commonly-used system and network hardware and software. The proposed approach requires not only generating inventories of acquiring organizations' equipment and software products, and clear and detailed descriptions of every link in the supply chain, but also the identification of common components and their sources. This information is required not only for manufacturer and OEM supply chains, but also for the services supply chains of maintenance and repair organizations. When such critical components and services have been identified, one must prioritize their importance and apply appropriate security and testing. Such an identification and tracking system is only as good as its ability to incorporate up-to-the-minute changes and additions. This requires extensive real-time reporting and information sharing. The author presents a general description of a proprietary tool that facilitates the collaboration needed for such an approach to be effective.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114937403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A geospatial integrated problem solving environment for Homeland Security applications","authors":"D. Koch","doi":"10.1109/THS.2010.5655060","DOIUrl":"https://doi.org/10.1109/THS.2010.5655060","url":null,"abstract":"Effective planning, response, and recovery (PRR) involving terrorist attacks or natural disasters come with a vast array of information needs. Much of the required information originates from disparate sources in widely differing formats. However, one common attribute the information often possesses is physical location. The organization and visualization of this information can be critical to the success of the PRR mission. Organizing information geospatially is often the most intuitive for the user. In the course of developing a field tool for the U.S. Department of Homeland Security (DHS) Office for Bombing Prevention, a geospatial integrated problem solving environment software framework was developed by Oak Ridge National Laboratory. This framework has proven useful as well in a number of other DHS, Department of Defense, and Department of Energy projects. An overview of the software architecture along with application examples are presented.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128850660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Ohgaki, T. Kii, K. Masuda, T. Misawa, C. Pyeon, R. Hajima, T. Hayakawa, T. Shizuma, K. Kawase, M. Kando, H. Toyokawa
{"title":"Conceptual design of a nuclear material detection system based on the neutron / gamma-ray hybrid approach","authors":"H. Ohgaki, T. Kii, K. Masuda, T. Misawa, C. Pyeon, R. Hajima, T. Hayakawa, T. Shizuma, K. Kawase, M. Kando, H. Toyokawa","doi":"10.1109/THS.2010.5654977","DOIUrl":"https://doi.org/10.1109/THS.2010.5654977","url":null,"abstract":"A nuclear material detection system based on neutron / gamma-ray hybrid approach has been proposed for the container inspection at the sea port. The neutron from the inertial electrostatic confinement fusion source will be used for a fast pre-screening process. The quasi-monochromatic gamma-ray beam from the laser Compton Backscattering source will be used for an isotope identification for the precise inspection. Nuclear resonance fluorescence method will be employed for the isotope identification because of its high selectivity and high penetration for the shielding.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124566422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A handheld active millimeter wave camera","authors":"C. Adams, D. Holbrook, Robert Sengsten","doi":"10.1109/THS.2010.5655040","DOIUrl":"https://doi.org/10.1109/THS.2010.5655040","url":null,"abstract":"A microwave imaging technology is described where large area diffraction limited images are created by a small, low cost, low power, handheld device. The camera actively illuminates targets with a circularly polarized scanning confocal spot beam. Backscattered radiation is collected to form an image on an LCD screen. The camera is configured to image behind walls and other flat surfaces. A set of encoded omni-wheels track camera position so that a 2500mm × 1700mm image may be stitched together. Operating in the 24GHz ISM band, the camera is approximately 6” diameter and 8.5” tall. At this size we believe it enables a broad range of new inspection tasks.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124582777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk-informed assessment of regional preparedness","authors":"K. Crowther","doi":"10.1109/THS.2010.5655049","DOIUrl":"https://doi.org/10.1109/THS.2010.5655049","url":null,"abstract":"Risk-informed and sustainable preparedness of our nation's regions and localities is central to the safety and security of the United States. The first step to technology development for preparedness is clear requirements and correct methodologies. This paper presents methods for creating regional homeland security plans to ensure continuity of regional operations. First, regional preparedness strategy should focus on a region's vital socioeconomic interests. These industries can be identified through the application of key sector analysis methods that exploit large-scale and open-source databases reporting economic sector production and interdependence. Second, planning for regional preparedness should follow two complementary approaches focusing on catastrophic scenario-driven planning as well as all-hazards capabilities. Third, regional preparedness strategy should exploit existing organizations and preparedness governance structure. Most existing regional preparedness institutions organize around the concept of emergency support functions (ESFs). Defining the relationships between ESFs and critical infrastructure sectors will enable these existing organizations to broaden their mission to adopt more holistic preparedness planning and homeland security practices, and provide a foundation technology. This paper provides preliminary results from case studies in Virginia to illustrate each of these methods.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134299583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supply chain risk mitigation for IT electronics","authors":"F. McFadden, Richard D. Arnold","doi":"10.1109/THS.2010.5655094","DOIUrl":"https://doi.org/10.1109/THS.2010.5655094","url":null,"abstract":"Supply Chain Risk Management (SCRM) is one of the 12 Comprehensive National Cybersecurity Inititiatives (CNCI), but the range of supply chain problems has not been defined rigorously, and effective defenses have not yet been developed. Risks range from the increased unreliability of counterfeits to data exfiltration and adversary control enabled by hardware Trojan horses embedded in chips. Risks are different for military vs. non-military Government vs. civilian organizations. We cite cases that underscore the reality of supply chain risk, and analyze the structure of supply chains that affect different part of the market for IT electronics, in order to provide a better understanding of attack methods. We discuss techniques for defending against the range of threats, and propose a practical solution based on a suite of simple, inexpensive test procedures that could be used to build an \"80% solution\" for detection of counterfeits and embedded malicious implants before they are deployed. Tests we have prototyped include power signatures and of IR thermographic signatures of boot events. Deployment of such a test suite would change the SCRM game by making it significantly more difficult for supply chain exploits to succeed.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131295851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Atluri, Basit Shafiq, Jaideep Vaidya, Soon Ae Chun, Ghulam Nabi, Michael Trocchia, Nabil Adam, Christopher Doyle, Lawrence E Skelly
{"title":"Information sharing infrastructure for pharmaceutical supply chain management in emergency response","authors":"V. Atluri, Basit Shafiq, Jaideep Vaidya, Soon Ae Chun, Ghulam Nabi, Michael Trocchia, Nabil Adam, Christopher Doyle, Lawrence E Skelly","doi":"10.1109/THS.2010.5655099","DOIUrl":"https://doi.org/10.1109/THS.2010.5655099","url":null,"abstract":"For an effective and timely acquisition, deployment, and distribution of needed drugs in emergencies, it is crucial to provide the end-to-end visibility of the pharmaceutical supply chain (PSC) to the involved parties. Recently, the Science and Technology Directorate of the U.S. Department of Homeland Security has developed a standard-based framework for maintaining and sharing of the emergency data, called Unified Incident Command Decision Support (UICDS). UICDS provides an infrastructure for information sharing among the disparate organizations responding to an emergency. In this paper, we leverage the UICDS infrastructure, and extend it to enable information sharing for pharmaceutical supply chain management in emergency response.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123408464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}