J. E. Koster, J. P. Johnson, D. Macarthur, S. G. Walters
{"title":"Alpha detection as a probe for counter proliferation","authors":"J. E. Koster, J. P. Johnson, D. Macarthur, S. G. Walters","doi":"10.1109/CCST.1994.363803","DOIUrl":"https://doi.org/10.1109/CCST.1994.363803","url":null,"abstract":"An indication of the presence of special nuclear material (SNM) can be obtained by the detection of alpha particles from the decay of the SNM. Current techniques for detecting alpha particles have a number of limitations. Sensitive conventional detection of SNM traces involves off-site laboratory analysis-but at the loss of an on-site confirmation. Fieldable detection instruments, on the other hand, are delicate and have poor sensitivity. New long-range alpha detection (LRAD) technology mitigates these limitations. An LRAD-based instrument relies an the detection of the hundreds of thousands of ions produced in ambient air by one emitted alpha particle. The ions can be transported to an ion detector at a distance much greater than the range of the original alpha particle. The LRAD-based monitors have the characteristics of high sensitivity, fast (real-time) response, ruggedness, and reliability. Many of the designs are quite portable. In this paper, several scenarios are identified for which particular LRAD-based detectors can provide confirmation of proliferation activity.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128648155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Infra red lighting, heuristic or logical design","authors":"H. Devereux","doi":"10.1109/CCST.1994.363785","DOIUrl":"https://doi.org/10.1109/CCST.1994.363785","url":null,"abstract":"For many years Infra red (IR) lighting has been used with closed circuit television (CCTV) systems to provide covert lighting of a scene. Whilst much development of IR sources has been carried out to provide the most efficient IR illuminator, with a long lamp life, little research has been done on measuring the density of IR flux in the field, and using this to design IR lighting schemes. This paper will discuss results of the work carried out by the Security Equipment Assessment Laboratory into the use of similar design techniques to those used in Visible lighting schemes, to enable standards to be set. The aim of this work is to provide better quality IR illumination for sites where the additional cost of an area lighting scheme is vindicated by the enhanced image quality attained, and to look at the design techniques that can be used.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"654 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating physical and computer access control systems","authors":"J. Smith, R. Charland","doi":"10.1109/CCST.1994.363771","DOIUrl":"https://doi.org/10.1109/CCST.1994.363771","url":null,"abstract":"Current systems for controlling access to buildings and to computers use the same basic ideas, but do not work together. Employees must memorize or carry many different access credentials. Security managers must learn how to use a variety of systems that cannot provide a consistent, company-wide security picture. All integrated access control system gives employees a single access token that lets them through doors and onto computer systems. It also has an integrated database that gives security managers a company-wide view of security. One way to move to an integrated system is to first introduce smart cards as dual-purpose access tokens. Later you can build an integrated access control database. There are challenges to building such a system, but clear benefits as well.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124410618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart gun technologies: one method of eliminating unauthorized firearm use","authors":"D. R. Weiss","doi":"10.1109/CCST.1994.363773","DOIUrl":"https://doi.org/10.1109/CCST.1994.363773","url":null,"abstract":"Many law enforcement agencies agree that a need does exist for a technology that would help prevent misuse of law enforcement firearms. This is a problem that has been in need of a solution. This problem can be addressed through the integration of modern sensors with control electronics to provide authorized user firearms for law enforcement and even recreational uses. A considerable benefit to law enforcement agencies, as well as society as a whole, would be gained by the application of recommended Smart Gun Technologies (SGT) as a method of limiting the use of firearms to authorized individuals. Sandia National Laboratory has been actively involved in the research and design of technologically sophisticated surety devices for weapons for the DOE and DOD. This experience is now being applied to criminal justice problems by transferring these technologies to commercial industry. In the SGT project Sandia is developing the user requirements that would limit a firearms use to its owner and/or authorized users. Various technologies that are capable of meeting the requirements are being investigated, these range from biometrics identification to radio-controlled devices. Research is presently underway to investigate which technologies represent the best solutions to the problem. Proof of concept demonstration models are being built for the most promising SGT with the intent of technology transfer. Different solutions are recommended for the possible applications: law enforcement, military, and commercial (personal protection/recreational) use.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116724829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video motion detection systems: a review for the nineties","authors":"R. M. Rodger, I. J. Grist, A. O. Peskett","doi":"10.1109/CCST.1994.363788","DOIUrl":"https://doi.org/10.1109/CCST.1994.363788","url":null,"abstract":"Video motion detection systems (VMDs) have been available for many years. The development of microprocessors has enabled improvements to be made, particularly during the early 1980s, to the performance of these systems. Some further advances have been made in the 1990s. Most recently, relatively inexpensive computer based systems incorporating neural networks, have been employed for Intelligent Scene Monitoring (ISM). ISM identifies user defined events while ignoring other activity in the scene. It adapts to changing backgrounds and can be straightforward to set up and operate. Another recent innovation has used the geometry of three-dimensional space rather than the two dimensions of a single closed circuit television (CCTV) image. This is achieved by analyzing the overlap of television images, from more than one TV camera. This paper reviews the development of VMD, describes methods of operation and presents performance information on some recently developed systems.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124005555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensor for gravitational field and its application to measures against large earthquake disasters","authors":"J. Chiba","doi":"10.1109/CCST.1994.363779","DOIUrl":"https://doi.org/10.1109/CCST.1994.363779","url":null,"abstract":"A gravitational field sensor is described as well as its application to provide warnings so that measures can be taken to mitigate the effects large earthquakes. One of the most promising sensors uses the principle of Michelson interferometry. Assuming a great earthquake (magnitude M=7) where the epicentral distance to a city is long, for instance, /spl sim/100 km the sensor will respond to the turbulent gravitational field with about 20 dB sensitivity 7 seconds before the seismic wave (primary wave) arrival. Even in a short period such as this it will be possible to take some safety measures like turning off the gas and nuclear reactors, bringing trains to a sudden stop, etc.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122124797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Sage, K. Wickham, J. Boyce, S. Gornall, D. Toulson
{"title":"Estimating performance limits for an intelligent scene monitoring system (ISM) as a perimeter intrusion detection system (PIDS)","authors":"K. Sage, K. Wickham, J. Boyce, S. Gornall, D. Toulson","doi":"10.1109/CCST.1994.363787","DOIUrl":"https://doi.org/10.1109/CCST.1994.363787","url":null,"abstract":"Intelligent Scene Monitoring (ISM) is an evolutionary next step beyond basic Video Motion Detection. An ISM system takes video imagery as an input and is expected to alarm only when a specific user-defined event or sequence of events occurs in the scene. It is expected to work in \"busy\" scenes, alarming only on the target patterns of behaviour, to the exclusion of all other activity. A fundamental question arises out of using video as a PIDS input. What levels of performance (in terms of Probability of Detection P/sub D/ and False alarm Rate FAR)? Video (particularly outdoors) is a complex data source and the image processing task for PIDS is non-trivial in the ISM context. We have investigated the performance limits for ISM systems using neural network classifiers in an outdoors \"sterile zone\" application. This paper defines the sterile zone analysis and image processing tasks, the study methodology and presents some feasibility results (obtained using seal data). It presents an academic, and experimentally justifiable, viewpoint on the tractability of the problem given a predetermined system performance.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129953686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrepid: a new outdoor perimeter sensor technology","authors":"R. K. Harman","doi":"10.1109/CCST.1994.363778","DOIUrl":"https://doi.org/10.1109/CCST.1994.363778","url":null,"abstract":"Southwest Microwave Inc. (SMI) announces Intrepid Reflex Cable (RC), a new (patent pending) acoustic cable intrusion sensor technology that offers fewer false alarms, much lower installed cost and many new features. Intrepid is a radically new intrusion sensor which redefines the term \"security system\". It provides an inexpensive yet comprehensive answer to the most demanding of perimeter security problems. Intrepid is simple. Its unique (patents pending) Reflex Cable technology consists of a cable which is fastened along each surface to be protected - fence, wall, roof or ground - a Processor Module and a few accessories. Installation, calibration and maintenance is made easy using a Laptop or Palmtop computer.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133219250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting information assets through effective computer security training","authors":"T. R. Walsh","doi":"10.1109/CCST.1994.363782","DOIUrl":"https://doi.org/10.1109/CCST.1994.363782","url":null,"abstract":"Once you give users access to your computer systems, you're vulnerable! Giving untrained users access to your computer information systems is like giving the keys of a Lamborghini to a teenager! Your computer systems are an accident waiting to happen, unless you have an effective computer security training program embedded within your high-technology security. Because computer security training is usually mandatory, employee attitude affects what they'll get out of the training. Employees dread (and resist) computer security training. The author discusses how to deliver computer security training to users, to reduce the risks to your information systems.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cost effective perimeter security","authors":"C. Tarr","doi":"10.1109/CCST.1994.363794","DOIUrl":"https://doi.org/10.1109/CCST.1994.363794","url":null,"abstract":"There are many measures that could be taken to make a perimeter more secure. These measures can be expensive and the benefits they provide may not justify this expense. The primary concern of this work is to make more cost-effective decisions by finding the right balance between security and cost. A computer software package known as CLASP (comparative Layout Analysis for Secure Perimeters) has been developed to support this decision making process. It is based on a mathematical model which evaluates sets of performance measures, including data on costs. The model was initially presented at an earlier conference [C.J. Tarr, Proceeding of the 1992 international Carnahan Conference, p.164]. It has now been operational for about two years. This paper examines the experience of using the package in various operational situations during that period. The advantages and limitations of using the package are discussed in comparison with previous approaches.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114927881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}