{"title":"Developments, applications of and experiences with a digital processed microphonic cable sensor","authors":"L. Den Dooven, G. Hellard","doi":"10.1109/CCST.1997.626235","DOIUrl":"https://doi.org/10.1109/CCST.1997.626235","url":null,"abstract":"In the late 1970s the first microphonic cable detection systems for fences appeared on the market. In comparison to existing fence sensors built in solid housings already on the market at the time, these systems had many advantages, e.g. they were simple to install, highly reliable with high performance and good value for money. Developments in technology over the years has lead to various microphonic cable developments on the basis of different technological and physical principles. However, the performance of all these systems was restricted by the very simple analog evaluation principles used by different manufactures. Sensitivity was adjustable but not defined, and the detection to false alarm ratio was rather an accidental result of a longer testing period. In 1993 the PERIFON-M(R) system appeared on the market. It was the first microphonic sensor based on digital evaluation principles. Its automatic adjustment to any fence structure represents a significant breakthrough in solving the various problems mentioned above. This paper will describe the processing principle, integration of various fence structures, automatic sensor adjustment, detection, false alarm recognition, the performance and maintenance program, intercommunication using a portable PC and finally the experience with the system over the last three years.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123168921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authenticated tracking and monitoring system (ATMS) tracking shipments from an Australian uranium mine","authors":"J. L. Schoeneman, D. Sorokowski","doi":"10.1109/CCST.1997.626275","DOIUrl":"https://doi.org/10.1109/CCST.1997.626275","url":null,"abstract":"The Authenticated Tracking and Monitoring System (ATMS) answers the need for global monitoring of the status and location of sensitive items on a worldwide basis, 24 hours a day. The ATMS concept uses wireless sensor packs to monitor the status of the items and environmental conditions, to collect a variety of sensor event data, and to transmit the data through the INMARSAT satellite communication system, which then sends the data to appropriate ground stations for tracking and monitoring. Authentication and encryption algorithms are used throughout the system to secure the data during communication activities. A typical ATMS application would be to track and monitor the safety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements. Following discussions between the Australian Safeguards Office (ASO), the U.S. Department of Energy (DOE), and Sandia National Laboratories (SNL) in early 1995, the parties mutually decided to conduct and evaluate a field trial prototype ATMS to track and monitor shipments of uranium ore concentrate (UOC) from a currently operating uranium mine in Australia to a final destination in Europe. This trial is in the process of being conducted on a worldwide basis with tracking and monitoring stations located at sites in both Australia and the U.S. This paper describes the trial.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131553723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital and analogue watermarking of video recordings","authors":"O. D'Souza","doi":"10.1109/CCST.1997.626241","DOIUrl":"https://doi.org/10.1109/CCST.1997.626241","url":null,"abstract":"The security industry is increasingly using video as a tool to support the fight against crime. The volume of video recordings and image data that is being stored is growing at an alarming rate and may soon become unmanageable and/or unusable as evidence as a result of the current poor management of this valuable resource. Digital Video and/or Images are now clearly identified as valuable \"DATA\" by security personnel, clients, law enforcement authorities and the legal profession. However, the current authenticity of most of this \"data\" is questionable because there are no formal \"secure tagging\" and handling guidelines and/or standards. As an example, the formal methods in place to issue and secure the issue of keys have established unique tracing systems and databases in the lock and safe industry. Information maintained generally helps to identify origins and establish some uniqueness that improves the management and traceability of something as small as a key.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131925725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The usage of satellite communications at the police of Japan","authors":"A. Takashi","doi":"10.1109/CCST.1997.626272","DOIUrl":"https://doi.org/10.1109/CCST.1997.626272","url":null,"abstract":"National Police Agency of Japan-NPA-has established Satellite Communication System all over Japan and is operating it. This system supplies services such as not only the satellite telephone, but also the video transmission in a high-resolution mode, in addition, the communication of high-speed computer data to all police organizations in Japan. The main reason of building the system is to promote the quality of police service in various fields. We have installed fixed type satellite communication sets, mobile type sets and a portable type set. When some cases happened, we bring them to the spots, and send images, voices and data to NPA and the Prefectural Police Headquarters-PPH. The system enables commanders to manage police activities from remote places because they can grasp the circumstances with the information transmitted. In this paper, I describe some characteristics of this system and explain some examples for the effective usage.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117013043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Management for real key systems. A software solution","authors":"","doi":"10.1109/CCST.1997.626253","DOIUrl":"https://doi.org/10.1109/CCST.1997.626253","url":null,"abstract":"It is a common requirement of any organisation that uses locks to secure rooms, that a proper method of recording and controlling the keys is needed. Even automatic swipe card or pin numbers systems still require a manual key override in the case of an emergency. This paper took at the three piers of key management and the requirements to properly and accurately record who has/had what key and what that they gave them access to. An implementation of these requirements is demonstrated in the windows based software package known as KeyMan.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126193831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}