{"title":"Supervision of high voltage electricity pylons, principle structure and measurements for the selection of proper sensor systems","authors":"U. Oppelt","doi":"10.1109/CCST.1989.751998","DOIUrl":"https://doi.org/10.1109/CCST.1989.751998","url":null,"abstract":"Electrical energy is an essential part of life in industry and private scope. Nearly permanent availability at almost all places in adequate quantity gives it a general value. This justifies considerable technical expense. Nevertheless, this complex energy system is vulnerable if an attack occurs in the area of high voltage distribution. Where energy is transferred across large distances in concentrated form, damage is relatively easy to cause. Damage leads to risk for people and enormous cost for repair of wiring and falling of use. Most attacks on high tension poles are performed by terrorists. The most frequently used tool is the saw. This method of attack is very slow and labor-intensive but easy to perform. Often the attack cannot be finished, when such terrorists have to leave the scene. Then the next storm could tilt the pole. If such forms of attack can be detected, quick engagement can help avoid bigger damage. Other methods of destroying a pole are faster, but require more effort to prepare and adequate tools. Such are welding, grinding and blasting. In such cases, the pole could be destroyed, but there is always a good chance to catch the violent person if a security system is in place. Therefore security choices for high tension poles are of great interest. This paper reports on first investigations of different sensors of this purpose.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126764741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer security economics","authors":"E. Orlandi","doi":"10.1109/CCST.1989.751963","DOIUrl":"https://doi.org/10.1109/CCST.1989.751963","url":null,"abstract":"For most people, managers as well as technicians computer security is still regarded as an overhead. The adoption of security measures is viewed as a trade off between security and efficiency. In our opinion, security is a plus for an information system. In fact, it transforms an unreliable system into a reliable one by adding value to it. In a time when processor and memory are free commodity goods, the concern for the trade off between security and efficiency should not be a problem any more.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129800809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronic surveillance system vulnerability to advanced weapon threats","authors":"E. Van Keuren, R. Braasch, B. Kelley","doi":"10.1109/CCST.1989.751953","DOIUrl":"https://doi.org/10.1109/CCST.1989.751953","url":null,"abstract":"The primary focus of this paper is on the effects of phenomena produced by advanced weapons on physical security system performance. The types stressed in the paper are the high-altitude electromagnetic pulse, high-power microwaves, and lasers. Topics include generation mechanisms, interactions with security system components and possible effects, and illustrative counter measures. This paper is not intended to imply that the types of threats discussed are applicable to all types of security systems and that all systems should be designed to withstand them. For example, they would not be applicable to a residential burglar alarm. The threats in this paper might be available to a Government activity or to a well financed terrorist or sabotage organization, and are applicable to systems designed to protect against such groups. Also, although in some instances they might be used to assist in covert penetration, in most instances it is not expected that they would be used for that purpose. These threats will have the capability to render the total system or major components thereof inoperative, and this is the manner in which it is expected that they would be encountered.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131107772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Foiling the wiley hacker: more than analysis and containment","authors":"H. Kluepfel","doi":"10.1109/CCST.1989.751947","DOIUrl":"https://doi.org/10.1109/CCST.1989.751947","url":null,"abstract":"This paper will look at the methods and tools used by system Intruders. It will analyze the development of the hacker, his motivation, his environment and the burglar tools used for system intrusion. It will also probe the nature of the vulnerable networking environments that are the target of intrusions. More important, it will address turning the tables on these Intruders with their own tools and techniques. Besides reacting to attacks, there are many opportunities to learn from the intruders and design that knowledge into now defensive solutions for securing computer based systems. Having presented the problem, the paper will present a strategy to defend and thwart such intrusions in our Increasingly networked and distributed computing and telecommunications environments.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"2000 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125733329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer-based communication system for police","authors":"Pong-Fui Chang, H. Hwang, J. Hsu","doi":"10.1109/CCST.1989.751988","DOIUrl":"https://doi.org/10.1109/CCST.1989.751988","url":null,"abstract":"The possibility of interfering or sabo taging the police communication network due to easily available electronics to the criminal elements is growing everyday. Thus, the requirement for secure communications in law enforcement is becoming more and more critical. Modern computer technology has the potential for increasing the effectiveness and efficiency of police activities. This paper presents a viewpoint of a computer based communication system which meets the specific requirements of security. In this system, an automatic monitoring system is designed to provide the operation management and performance monitoring of the communication system.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115226713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Alarm monitoring using data communications networks","authors":"D. J. Donaldson","doi":"10.1109/CCST.1989.751994","DOIUrl":"https://doi.org/10.1109/CCST.1989.751994","url":null,"abstract":"This paper examines the technical aspects of monitoring alarm systems using private data communications networks. These networks can be either X.25 or SNA and issues such as security, availability and response are discussed.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127124354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of a key generation and distribution algorithm for secure communication in open systems interconnection architecture","authors":"R. Ramaswamy","doi":"10.1109/CCST.1989.751975","DOIUrl":"https://doi.org/10.1109/CCST.1989.751975","url":null,"abstract":"A key generation and distribution algorithm is presented in this paper and shown applied for secure transmission of user data between two peer-layers of an Open Systems Interconnection Reference Model Architecture located at any source and destination end-user host systems. In particular, the algorithm (i) generates and distributes a session key between two peer-layers during Connection Establishment phase, (ii) encrypts and decrypts their user data, present in the Protocol Data Unit, using the same session key during Data Transfer phase, and (iii) after transmitting user data, it destroys the session key during Connection Release phase. For simulation purpose, the algorithm is shown applied between the transport service user and provider, present at the source and destination host systems, for secure transfer of transport service user data to the corresponding remote peer layer using Class 4 Transport Protocol of OSI-RM Architecture.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127461074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Repels: a new rapid deployment guided radar sensor","authors":"W. Feller, M. Maki","doi":"10.1109/CCST.1989.751969","DOIUrl":"https://doi.org/10.1109/CCST.1989.751969","url":null,"abstract":"REPELS (Rapidly Extendible Perimeter Line sensor) is a new concept in guided radar perimeter security introduced in 1988. it utilizes a technology termed 'coupled wave device' (CWD) to transfer detection features currently available only to leaky cable buried line sensors, to the above ground, rapid deployment, sensor requirement. Thus, in less than 20 minutes, a person can set up a sensor that establishes a 100-metre long detection barrier (several metres high) about a resource. Like buried line guided radar sensors it provides a terrain-following detection zone and, by operating at VHF frequencies, it also inherently optimizes detection of humans but discriminates against small nuisance targets. This paper addresses some of the physics behind the CWD technology on which the sensor is based, and contrasts this development with other sensor alternatives, including leaky cable sensors. Also discussed is the hardware design of the sensor, including both the electronics and sensor elements. Finally, the paper discusses deployment aspects of the sensor and initial test results for various intrusion scenarios. Typical applications are security for mobile resources such as aircraft and vehicles, dignitary (VIP) security, or temporary stand-in where other sensor zones have failed. Included in the test results is the sensor response to typical human body orientations and to small animals. The REPELS sensor provides a new alternative to allow rapid deployment secur ity for mobile resources and irregular sites.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128693406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic fingerprint matching","authors":"F. Preston","doi":"10.1109/CCST.1989.751979","DOIUrl":"https://doi.org/10.1109/CCST.1989.751979","url":null,"abstract":"In automatic fingerprint identification systems poor quality impressions and latents often require expert interpretation if usable encodings are to be obtained. When this is necessary there are basically two different approaches taken for data entry \"direct\" encoding of the minutiae and \"tracing\" the ridges. The minutiae identified using these two methods on a test set of 49 latents were compared. The results indicate that these two methods are not just alternative ways of entering information but are radically different approaches which often lead to substantially different interpretations of the impression. The results of running searches on the two sets of minutiae using the Home Office matching algorithm do not indicate that either method is to be preferred from the point of view of accuracy. This conclusion is reinforced when the encodings are compared directly by eye with the matching impressions. Interpreting and encoding an impression viewed in isolation, by whatever method, is a fundamentally different task to the iterative process used by fingerprint experts to determining a match. There is scope for improving the matching accuracy of automatic fingerprint systems. The view is presented that a significant improvement could be achieved if algorithms are developed which are capable of iterative interpretation of the encoded or original data.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114766340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Custance, P. Golton, T. Ellis, Paul L. Rosin, P. Moukas
{"title":"The design, development and implementation of an imaging system for the automatic alarm interpretation of CCTY sequences using IKBS techniques","authors":"N. Custance, P. Golton, T. Ellis, Paul L. Rosin, P. Moukas","doi":"10.1109/CCST.1989.751983","DOIUrl":"https://doi.org/10.1109/CCST.1989.751983","url":null,"abstract":"The assessment of alarm cause from a perimeter intrusion detection system is manpower intensive. Work by the Home Office has shown considerable benefits can accrue from the use of digital storage, replay and analysis of image sequences from surveillance CCTV. The design of the system is heavily dependent upon the number of cameras on site, the need (or otherwise) for pre-alarm triggering, the probable speed of movement of objects within the scene, and the likelihood of near simultaneous alarms occurring. The techniques used to classify the cause of an alarm are described in a further paper to be presented at the conference.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130255069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}