{"title":"Conference and meetings safety-security technology","authors":"D. Reilly, L. Usher","doi":"10.1109/CCST.1989.751996","DOIUrl":"https://doi.org/10.1109/CCST.1989.751996","url":null,"abstract":"The UK Government owned Queen Elizabeth II Conference Centre in London is possibly the first conference centre in the world (certainly the first in the United Kingdom) which had security and safety as a fundamental, and large part of the original architect's brief. Spare conference capacity is marketed within the conference industry to commercial clients who are subject to the same security regime as government users. This paper briefly outlines the underlying security philosophy within the conference centre; the physical and systems approach, and how the building and systems work towards achieving security aims. The authors are particularly concerned at the impact the security systems have had on people. They touch upon the perceptions of the operators and try to analyse those of the user. Systems have had to be modifed to make them more flexible, but people's attitudes are not so malleable. How can we change our attitudes without reducing our security awareness, and how can we modify people's attitudes to our, operation?","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114337537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis procediure of perimeter protection systems -the tdci vector","authors":"A. Bilbao, G. Cruz, G. Herrero","doi":"10.1109/CCST.1989.751984","DOIUrl":"https://doi.org/10.1109/CCST.1989.751984","url":null,"abstract":"The analysis procedure proposed is a comparative method for testing the effectiveness of Intrusion Protection Systems of enclosures in general. This method allows to quantify the Systems, according to five parameters, in order to obtain a vector, or a numerical profile, which allows to measure the effectiveness of the Intrusion Protection Systems from different points of view. These points of view are: the effectiveness of the phisic barriers in retarding the intruderaction (T parameter), the effectiveness of the intrusion detection (D parameter), the effectiveness in the taking of decisions and general control (C parameter), and the effectiveness of response of the external and internal intervention forces (11 and 12 parameters).","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125586287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The electrified fence as a component of a physical protection system","authors":"B.W. Barnos","doi":"10.1109/CCST.1989.751985","DOIUrl":"https://doi.org/10.1109/CCST.1989.751985","url":null,"abstract":"The concept of using electrified barriers or fences for security reasons has been employed for many years. However, today's electrified fences bear little resemblance to the crude, rudimentary fences of yester-year. Modern fences make use of electronic circuitry to provide detection capabilities, and on long lengths include microprocessors to determine the point of intrusion. In the event of a power failure, an electrified fence can be either switched automatically to an inverter mode, enabling it to continue to act as an \"aggressive barrier\", or it can be switched to what is termed the self-guard mode of operation, whereby it acts as a low volt intrusion detection system. This paper discusses the effects of electrical current on the human body and looks at the physical and technical aspects of electrified fence systems, the application of such fences and the operation of these fence systems with regard to the physical protection of an area and the safety of site personnel and the general public.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121185122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speaker identity verification over telephone lines: where we are and where we are going","authors":"T. Feustel, G. Velius","doi":"10.1109/CCST.1989.751976","DOIUrl":"https://doi.org/10.1109/CCST.1989.751976","url":null,"abstract":"The ability to verify the identity of a speaker by analyzing speech, or Speaker Identity Verification (SIV), is an attractive means of providing security in the telephone network. As with other biometric security techniques, SIV uses a quality inherent in the user being verified, rather than a possession (e.g. badge) or piece of knowledge (e.g. password). SIV has a further advantage since it does not require elaborate customer premises equipment: only a telephone is needed. We will discuss potential applications of voice-based security and present accuracy data from a series of evaluative experiments with a Bellcore developed verifier. In addition, we will offer suggestions on how verification performance might be further improved, based on data collected using human listeners. Finally, although SIV system performance is quite good, there remain sonic difficult problems. Foremost among these is that individuals' voices are known to. change over time in ways that are poorly understood. Until more is known of the causes behind such changes, they must be acknowledged and dealt with in any potential application. We will discuss empirical and theoretical considerations in template management and criterion determination, particularly as they relate to changes that occur over time.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125988053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Is It Possible To Reduce False Alarms?","authors":"W. J. Friedl","doi":"10.1109/CCST.1989.751950","DOIUrl":"https://doi.org/10.1109/CCST.1989.751950","url":null,"abstract":"There is no general definition for false alarms. This is one reason why statistics about false alarms from government sources or from other institutions are neither uniform nor significant. If people observe some fundamental principles and practice them consistently, the large number of false alarms from alarm installations could be reduced considerably. It is of decisive significance that all points of alarm installations are observed with the same care according to the theory of probabilities. A further problem is that a high probability of burglar recognition and a low false alarm rate are contradictory goals.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127716210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A rule-based object-oriented model for security monitoring and control","authors":"J. Smart","doi":"10.1109/CCST.1989.751955","DOIUrl":"https://doi.org/10.1109/CCST.1989.751955","url":null,"abstract":"A new model for security control and monitoring systems can be effectively applied to a variety of security environments. Built on rule-based and object-oriented design paradigms, this model incorporates such functions as intrusion detection, access control, surveillance, and assessment. Recent developments of the Security Console Project at Lawrence Livermore National Laboratory are presented to illustrate the key concepts of the model.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of state analysis technology to surveillance systems","authors":"J. Mott, G. D. Wilson","doi":"10.1109/CCST.1989.751964","DOIUrl":"https://doi.org/10.1109/CCST.1989.751964","url":null,"abstract":"Security systems, in terms of sensor measurements supplied to a computer data acquisition system, are functionally equivalent to a multitude of other process monitoring systems and, therefore, may be considered part of a generic class of surveillance systems. Characteristics of this generic class are that repeatable system states exist and that many of the system input signals are correlated. A proprietary mathematical technique which can learn from previous examples of system operation and monitor the consistency of current system operation has been developed and implemented in very efficient robust software and successfully applied to a variety of real surveillance systems. The mathematics and software together are referred to as the System State Analyzer (SSA), and have demonstrated an ability to detect faults in individual sensors, to separate false alarms from true events, and to provide accurate synthetic variables for a degraded system. The SSA has the potential to significantly enhance the effectivity of computer based security surveillance systems.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132517869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Operations security: the missing link","authors":"D. B. Nickell","doi":"10.1109/CCST.1989.751962","DOIUrl":"https://doi.org/10.1109/CCST.1989.751962","url":null,"abstract":"Operations Security (OPSEC) comprises a rational approach, complementary to physical, personnel, and information security disciplines, to the identification and protection of critically important technology and information. OPSEC incorporates elements of operations and decision analysis, and draws on the skills of intelligence and security specialists to provide managers with a realistic basis for directing security activities. OPSEC is concerned with identifying and protecting information which adversaries could otherwise exploit to the agency or corporate detriment. For the first time in literature, we describe the means to quantify and evaluate the effectiveness of an OPSEC system and introduce the concept of a \"window of ambiguity.\" Through this approach we show that the higher the degree of uncertainty about the validity of available information, the more effective the OPSEC program. OPSEC is unique in that it places the responsibility for critical security decisions firmly in the hands of senior management, arming them with the information they need to make those decisions and the techniques essential to implementing them. OPSEC thus represents the missing link among management's objectives, a complex physical and information security system, and a totally effective, integrated security program.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132257157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security personnel screening","authors":"E. Amsel, T. Amsel","doi":"10.1109/CCST.1989.752000","DOIUrl":"https://doi.org/10.1109/CCST.1989.752000","url":null,"abstract":"Honesty is the key word, in the process of hiring employees. It's important in any business, it's critical in the security business. The damage a dishonest employee can create is irreversable, and it's the night mare of the security chief. Some examples: guards that let unauthorised personnel into the plant facilities, which in turn steal information and/or products,A CCTV controller with a drugs problem; Employees who trade their employers trade secrets, and so on. Because of all these problems,the security business should screen it's applicants very thoroughly, to prevent such cases. The process of security screening is made up of two elements. The first element is the background review with a special emphasis on the applicants involvement in any wrong doing in the past. The second element is the attempt to evaluate the applicants morale character. One has to remember, employees who were never involved in their past in wrong doing are not necessarily honest, they might just have lacked the opportunity or motives.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132185870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discourage the possibility of airborne attack with a good detection system: amethodology for planning","authors":"E. Greneker","doi":"10.1109/CCST.1989.751999","DOIUrl":"https://doi.org/10.1109/CCST.1989.751999","url":null,"abstract":"Detection of the ground intruder has been a subject of primary emphasis when planning an intrusion detection system. The ground intruder has been viewed as the major threat because the ground intrusion scenario does not require a means of sophisticated transport to gain access to a sensitive site. But a new trend is developing that should sensitize the security planners at sensitive facilities to begin to address the airborne threat as a credible intrusion scenario. Within the western hemisphere during the past 10 years, no less than 10 prison escape attempts have utilized helicopters as an escape transport. A terrorist, in an attack that resulted in the deaths of three Mid-East army personnel, used an ultra-light aircraft to circumvent normal border intrusion detection systems. Another terrorist was killed when explosives detonated prematurely in the gondola of his hot air balloon. Through use of the hot air balloon, the terrorists had succeeded in avoiding detection at the border before his explosives accidently detonated. There is another documented case where an innocent airborne intruder succeeded in landing a helicopter within the controlled boundary of a sensitive facility without detection until the pilot solicited assistance from the facility operations personnel. The short history of airborne intrusions and certain intelligence information indicates that the airborne intrusion scenario may be a trend of the future. The airborne intrusion scenario has many advantages over a ground assault. The airborne platform can be used to transport the intruder over traditional barrier systems that are designed to delay the ground intruder. The early-warning ground intrusion sensors are located on and behind the barriers, and the avoidance of the barriers denies security personnel early-waming information usually required for an optimum response, The airborne intruder also has access to the rooftops of buildings which can be used to strategic advantage. This paper serves as an introduction to the methodology that should be considered when planning for defense against the airborne intrusion.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121228990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}