{"title":"Monitoring / Verification using DMS: TATP Example","authors":"M. Manard, S. Weeks, K. Kyle","doi":"10.1109/THS.2008.4534454","DOIUrl":"https://doi.org/10.1109/THS.2008.4534454","url":null,"abstract":"Field-rugged and field-programmable differential mobility spectrometry (DMS) networks provide highly selective, universal monitoring of vapors and aerosols at detectable levels from persons or areas involved with illicit chemical/biological/explosives (CBE) production. CBE sensor motes used in conjunction with automated fast gas chromatography with DMS detection (GC/DMS) verification instrumentation integrated into situational operations-management systems can be readily deployed and optimized for changing application scenarios. The feasibility of developing selective DMS motes for a \"smart dust\" sampling approach with guided, highly selective, fast GC/DMS verification analysis is a compelling approach to minimize or prevent the illegal use of explosives or chemical and biological materials. DMS is currently one of the foremost emerging technologies for field separation and detection of gas-phase chemical species. This is due to trace-level detection limits, high selectivity, and small size. Fast GC is the leading field analytical method for gas phase separation of chemical species in complex mixtures. Low-thermal-mass GC columns have led to compact, low-power field systems capable of complete analyses in 15-300 seconds. A collaborative effort optimized a handheld, fast GC/DMS, equipped with a non-rad ionization source, for peroxide-based explosive measurements.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132769420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bruce Campbell, Huseyin Onur Mete, T. Furness, S. Weghorst, Z. Zabinsky
{"title":"Emergency Response Planning and Training through Interactive Simulation and Visualization with Decision Support","authors":"Bruce Campbell, Huseyin Onur Mete, T. Furness, S. Weghorst, Z. Zabinsky","doi":"10.1109/THS.2008.4534445","DOIUrl":"https://doi.org/10.1109/THS.2008.4534445","url":null,"abstract":"Teams of first responders work together to effectively manage a community-wide crisis. Traditionally, key groups such as police, fire, and medical are each trained for specific emergency procedures. Emergency response teams design training exercises to augment an individual's cognition associated with performing time critical roles. The aggregation of all individual cognition, distributed through communications, suggests a situation awareness that an incident commander requires to perform optimal decision-making. We are developing a computer-supported simulation environment with a decision support tool called the RimSim, to facilitate emergency response planning and training of first responders. We modularize RimSim for synchronous multi-player use or asynchronous individual use with simulated participants. Through interactive computer- supported role-play with shared visualizations, we are able to study distributed cognition with a long-term goal of identifying opportunities for improving information management during emergency response. We aim to improve mindful distributed cognition for first responders during emergency response to natural and man-made crises.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133037467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interoperable Role-Based Single Sign-On-Access to Distributed Public Authority Information Systems","authors":"K. Daniel, Thang Tran, C. Wietfeld","doi":"10.1109/THS.2008.4534472","DOIUrl":"https://doi.org/10.1109/THS.2008.4534472","url":null,"abstract":"The key challenge for Incident Response Organizations is to gather sufficient information about the incident location: In large loss operations information has currently to be requested time-consumingly from different, distributed public authorities. Single-Sign-On Systems are still in progress of devolopment, but all existing systems have the lack of role based access control in common and are based on the functional uncorrelation of their users. In this paper we will present a novel interoperability concept and prototype implementation for a combined Single Sign On (SSO) and Role Based Access Control (RBAC) information system and show its effectiveness through evaluation by implementing it. Just through single operation it will enable the security forces to get shared and simultaneous realtime access to distributed databases of relevant public authorities such as registry offices or building authorities, where table of hydrants, plans of (gas) pipelines or video sequences are available. Beyond the secure system architecture the focus lies on the performance analysis and analytical proof of reliability for our novel mobile information system.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125174284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Electronic Nose for Detecting Hazardous Chemicals and Explosives","authors":"P. Kurup","doi":"10.1109/THS.2008.4534439","DOIUrl":"https://doi.org/10.1109/THS.2008.4534439","url":null,"abstract":"This study describes a portable system based on mimicking the mammalian olfactory mechanism (electronic nose), that can sense and identify chemical vapors by automated odor recognition. The electronic nose developed in this research consists of an array of tin oxide sensors, with each sensor in the array giving a different electrical response for a particular target vapor introduced into the sensing chamber. The combined output from the sensor array forms a fingerprint, or signature, that is unique for a particular odor. Pattern recognition techniques based on principal component analysis and artificial neural networks were developed for learning different chemical signatures. The electronic nose was successfully trained and tested in the laboratory to recognize various chemicals such as benzene, toluene, ethyl benzene, xylene, and gasoline. This study successfully demonstrates the feasibility of an electronic nose for detecting and identifying chemical and explosive vapors.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126022183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Software Based Implementation of an APCO Project 25 Compliant Packet Data Transmitter","authors":"E. R. Ramsey, W. Miller, A. Kun","doi":"10.1109/THS.2008.4534487","DOIUrl":"https://doi.org/10.1109/THS.2008.4534487","url":null,"abstract":"This paper describes the effort within the Project54 program at the University of New Hampshire to develop a software based implementation of an APCO Project 25 (P25) compliant packet data base station, utilizing a standard PC interfaced to a commercial analog VHF FM transceiver. The goal is to develop an affordable system (under $10,000) to provide P25 compliant packet data for smaller public safety agencies requiring only a single data capable channel. The base station system is comprised of a standard PC interfaced to a commercial VHF FM transceiver. Software running on the PC implements the standard IP network interface, the P25 Common Air Interface packet assembly, forward error correction encoding, and finally the packet baseband modulation. The resulting analog baseband modulated signal is then input to the commercial VHF FM transceiver which performs the RF modulation. The process is reversed for data packet reception. This paper will focus on the overall design of the software based P25 packet data transmitter, the testing of the various stages for P25 compliance, and the testing of the final result for interoperability with commercial P25 compliant mobile radios.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121078481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Barry, M. Koehler, G. Jacyna, T. Bergen-Hill, M. Tierney
{"title":"Using Generative Analysis for Homeland Security: Modeling the Possibilities and the Probabilities","authors":"P. Barry, M. Koehler, G. Jacyna, T. Bergen-Hill, M. Tierney","doi":"10.1109/THS.2008.4534500","DOIUrl":"https://doi.org/10.1109/THS.2008.4534500","url":null,"abstract":"Frequently problems of homeland security require systemic solutions. Tactics, techniques and procedures must be innovatively combined with the latest technological advances to meet an emerging and ever changing threat. This paper provides a simulation based systems engineering approach to evaluate the wide variety of combinations that complex solutions require. A briefcase study for the defense of a large venue is provided to illustrate the methodology described herein.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124541208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on the Passive Detection of Clandestine Tunnels","authors":"J. Sabatier, G. Matalkah","doi":"10.1109/THS.2008.4534477","DOIUrl":"https://doi.org/10.1109/THS.2008.4534477","url":null,"abstract":"The results and methods used in an experimental study on the passive seismic detection of underground tunnels are presented. The study included the characterization of some man-made activities within tunnels, the use of triangulation and seismic imaging as source localization techniques, and preliminary results of using a laser Doppler vibrometer for detecting vibrational activities within a tunnel. Some properties of the ground that pertain to the detection of tunnels and the experimental methods used to extract them are also described.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115334984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical Access Protection using Continuous Authentication","authors":"R. Yap, T. Sim, Geraldine Kwang, R. Ramnath","doi":"10.1109/THS.2008.4534505","DOIUrl":"https://doi.org/10.1109/THS.2008.4534505","url":null,"abstract":"Traditional password based authentication systems assume that the user who manages to sign-on into the system is the actual authorized user. There is no differentiation between the authorized user and an intruder who knows how to sign-on into the system. This paper describes an authentication mechanism which reduces the risk of un-authorized system usage by continuously authenticating the current user. This is achieved by using biometric sensors which can verify the user in a transparent fashion. We have developed two such prototype systems - one for Linux, and the other for Windows - both of which are directly integrated with the operating system. This paper focuses on the Windows platform. The benefit of our continuous authentication system is that it gives a higher degree of assurance that the authorized user is indeed the one presently using the system, and does so in a way that is transparent to the user. Preliminary user studies on Windows demonstrate that continuous authentication can be used successfully on a user population using Windows on a variety of interactive applications which simulate a general task mix. Our studies show that the goal of transparency is achieved as most users were not bothered nor affected by presence of the continuous authentication system.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126801309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Surveillance System for the Recognition of Intent within Individuals and Crowds","authors":"C. Cohen, F. Morelli, K. A. Scott","doi":"10.1109/THS.2008.4534514","DOIUrl":"https://doi.org/10.1109/THS.2008.4534514","url":null,"abstract":"Differentiating between normal human activity and aberrant behavior via closed circuit television cameras is a difficult and fatiguing task. The vigilance required of human observers when engaged in such tasks must remain constant, yet attention falls off dramatically over time. In this paper we propose an automated system to monitor video sensors and tag aberrant human activities for immediate review by human monitors. From the psychological perspective, isolated human motion depicted by point-light walker (PLW) displays have been shown to be salient for recognition of action [17] and determination of emotional state [18]. We propose that by using the motion data that immediately precedes hostile behavior, it may be possible to classify hostile intent before destructive actions take place. These hostile intent gestures can be used to assign individuals a threat assessment level and improve remote sensor monitoring. Such assessments are useful for monitoring human activities and could potentially provide early warning of lED emplacement activities.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121852078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating Static Analysis into a Secure Software Development Process","authors":"D. Kleidermacher","doi":"10.1109/THS.2008.4534479","DOIUrl":"https://doi.org/10.1109/THS.2008.4534479","url":null,"abstract":"Software content has grown rapidly in all manner of electronic systems. Meanwhile, society has become increasingly dependent upon the safe and secure operation of these electronic systems. We depend on software for our telecommunications, critical infrastructure, avionics, financial systems, medical information systems, automobiles, and more. Unfortunately, our ability to develop secure software has not improved at the same rate, resulting in increasing reliability and security vulnerabilities. The increase in software vulnerability poses a serious threat to national and homeland security. Vulnerabilities have caused or contributed to blackouts, air traffic control failures, traffic light system breaches, and other well publicized security breaches in critical infrastructure. This threat demands new approaches to secure software development. Static analysis has emerged as a promising technology for improving the security of software and systems. Static analysis tools analyze software to find defects that may go undetected using traditional techniques, such as compilers, human code reviews, and testing. A number of limitations, however, have prevented widespread adoption in software development. Static analysis tools often take prohibitively long to execute and are not well integrated into the software development environment. This paper will introduce a new approach - the integrated static analyzer (ISA) - that solves many of these problems. Specific metrics will be provided to demonstrate how the new approach makes the use of static analysis tools practical and effective for everyday embedded software development. In addition to traditional analysis, the ISA approach enables detection of a new class of security flaws not otherwise practicable.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123548555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}