B. Higgins, D. Simonson, R. McGill, V. Nguyen, J. Stepnowski, R. Pai, S. Stepnowski, M. Rake
{"title":"Functionalized Sorbent Membranes for Use with Ion Mobility Spectrometry","authors":"B. Higgins, D. Simonson, R. McGill, V. Nguyen, J. Stepnowski, R. Pai, S. Stepnowski, M. Rake","doi":"10.1109/THS.2008.4534438","DOIUrl":"https://doi.org/10.1109/THS.2008.4534438","url":null,"abstract":"Ion mobility spectrometry (IMS) is a technique commonly used for trace detection of hazardous chemicals. The inlet of an IMS typically utilizes a membrane made of generic polymers such as polydimethylsiloxane or polyvinylidene fluoride. These membranes are designed to allow analytes through but protect the detector from dust and keep a controlled relative humidity and pressure. IMS signals can be enhanced using sorbent polymer membranes to concentrate vapors of interest. Specifically, in this work a strong hydrogen bond acid (HBA) sorbent polymer (HCSFA2) was synthesized to reversibly bind with hydrogen bond basic (HBB) analytes. HCSFA2 has suitable thermal stabilities but offers low viscosities above 50degC. To mitigate this problem HCSFA2 was combined with fillers to maintain the membrane's physical structure. The HCSFA2 composites were characterized using various techniques including thermogravimetric analysis, optical microscopy, inverse gas chromatography, FTIR, and differential scanning calorimetry. Additionally, data from a membrane interfaced with an ion mobility spectrometer (IMS) is described.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132756735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software and CyberSecurity: Attack Resistant Secure Software Development Survivable Distributed Communication Services (DCS)","authors":"N. J. Fuller, G. Simco","doi":"10.1109/THS.2008.4534521","DOIUrl":"https://doi.org/10.1109/THS.2008.4534521","url":null,"abstract":"Messaging is a critical prerequisite for the scalability, dependability, and reliability of distributed services. A scalable messaging platform accommodates multiple diverse clients and adapts seamlessly within a heterogeneous environment. A reliable and dependable messaging scheme also offers a specific level of guarantee for the delivery of messages to legitimate services. Application services rely on message transport intermediaries to preserve loosely coupled message communication described as distributed communication services (DCS). DCS provides asynchronous and publish/subscribe communication for multiple dispersed services. Research in this area has exposed reliability and dependability problems with the publisher/subscriber architecture under denial of service (DoS) and/or distributed denial of service (DDoS) attacks. To support critical operations across distributed environments, the existing DCS paradigm needs to be extended to assure survivability against DoS/DDoS attacks.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"35 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133890094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design Considerations for Intrusion Detection Wide Area Surveillance Radars for Perimeters and Borders","authors":"W. Butler","doi":"10.1117/12.816845","DOIUrl":"https://doi.org/10.1117/12.816845","url":null,"abstract":"Radars operate at their best with long line of sight and clear environmental conditions. Superior security radars excel when the environmental conditions are less than perfect and the terrain is challenging. If careful consideration is given to the design of a physical security system taking into account the threat, environment, and overall system performance requirement, it is evident that ground surveillance radars provide superior performance and value over other perimeter sensors, and FMCW radars are superior to pulse Doppler radars for this application.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130535742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to tackle security issues in large existing/legacy systems while maintaining development priorities","authors":"D. Campara, N. Mansourov","doi":"10.1109/THS.2008.4534443","DOIUrl":"https://doi.org/10.1109/THS.2008.4534443","url":null,"abstract":"Legacy software systems represent a large base of software assets that hold significant corporate intellectual properties, along with carrying large opportunity costs and operational risks. There is a growing need to prolong their lifespan through maintenance efforts and enhance them to accommodate new and changing market requirements and governmental regulations. The majority of these systems were developed at a time when security requirements were more relaxed and not well understood, and at a time when being netted did not have the same consequences as exist today. There is a real need for retrofitting security into legacy software systems so they can operate in the current environments. However, over time, as legacy systems became larger and more complex, their design structure eroded which hinders system comprehension, compromises architectural integrity and decreases maintenance productivity. This makes the task of retrofitting security difficult and risky. Since legacy systems are a large part of our nations' critical infrastructure we must retrofit-in security in such way that the level of confidence related to security is substantially increased. This paper will discuss a standards based approach to achieving this goal.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"14 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120914635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Baddeley, K. Younkin, R. Riensche, D. Best, W. Pike, R. May
{"title":"From Desktop to Field: Deploying Visual Incident Analysis for Law Enforcement","authors":"B. Baddeley, K. Younkin, R. Riensche, D. Best, W. Pike, R. May","doi":"10.1109/THS.2008.4534451","DOIUrl":"https://doi.org/10.1109/THS.2008.4534451","url":null,"abstract":"We present a prototype mobile application environment for law enforcement users to assist them in daily operations. This system supports the collection of real-time observations and allows users to quickly share their findings with team members. Mobile tools for law enforcement introduce safety and other operational constraints that must be considered in developing appropriate user interfaces. Our environment attempts to address these challenges and provide tools to increase information sharing among officers and, expedite form-filling and evidence collection. Moreover, real-time location tracking and mapping enables mobile users to view the locations of team members and to push data (such as field-collected images, video, or text) to them.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128415758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dynamic Decision Support System for Addressing Terrorist Transfer Threats","authors":"R. Adler, J. Fuller","doi":"10.1109/THS.2008.4534417","DOIUrl":"https://doi.org/10.1109/THS.2008.4534417","url":null,"abstract":"The terror transfer threat consists of the movement of terrorists and materiel into the United States piecemeal, via diverse transport modes from multiple countries and shipping points. Interdicting these elements before they penetrate our borders and are assembled to stage attacks poses major security challenges. We describe TRANSEC, a pilot decision support system that models and helps validate assessments of maritime transfer threats and strategies for mitigating those risks. TRANSEC employs a network model that links the key entities involved in the transport of terrorists and threat-related materiel. It dynamically projects the likely impacts over time of existing and prospective security measures on interdiction effectiveness metrics at embarcation, transit, and debarkation points. The system allows alternate strategies to be assessed against scenarios based on diverse assumptions about funding and technology trends; terrorist objectives and capabilities; and program implementation results. TRANSEC also enables monitoring of strategies as they are executed, to re-validate or adjust them adaptively as environmental conditions evolve. This simulation-based methodology helps uncover security gaps and unintended program consequences in a safe and low cost virtual environment. TRANSEC thereby reduces risk and improves confidence and consistency in transfer threat security decisions.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126476384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel 3D Seismic Sensor for Virtual Border Application","authors":"S. Mican","doi":"10.1109/THS.2008.4534425","DOIUrl":"https://doi.org/10.1109/THS.2008.4534425","url":null,"abstract":"There are very few seismic-based early-warning systems on the market today. High level of FAR, bottlenecks at sensor to processing unit link levels, environment dependency and lack of targets classification and localization accuracy are drawbacks shadowing the strategic advantages of the concept. The new 3D seismic sensor for virtual border application, under development at Spider-Tech (Spider Technologies Security Ltd.), Israel, is addressing those drawbacks and paves the way to a seismic based early warning system with better performances to cost ratio than of other early-warning systems existing today. A new sensing element - an accelerometer, having low weight, small geometry and high performances, specially designed for this type of application, is used as building brick for the new sensor. The new proprietary concept combines differential acceleration measurement on each axis with a virtual single point 3D measurement. The integrated data processing hardware runs the detection, the noise cancellation, the DOA (direction of arrival) angle calculation and the target classification algorithms and has a strong impact on the amount of data transferred to the upper levels of the system. The use of the novel 3D sensor in the seismic based early- warning systems can help extend the sensor's detection range for human targets from minimal radius of 15 m to more than 30 m - depending on soil type, with detection rates exceeding 85% while maintaining an ultra low FAR (False Alarm Rate). When information from at least two sensors is combined, target localization precision can reach plusmn2 m at 15 m radius.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121956464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Seeking Shelter: Towards a Multi-Agent Based Simulation of a School Lockdown Scenario","authors":"L. Welch, S. Ekwaro-Osire","doi":"10.1109/THS.2008.4534464","DOIUrl":"https://doi.org/10.1109/THS.2008.4534464","url":null,"abstract":"The goal of a school lockdown is to isolate occupants from a threat by temporarily locking them inside the school building and away from harm. The research in this paper is motivated by the desire to encourage and contribute to the longer-term development of credible simulations of school lockdown scenarios. This paper focuses on the initial goal of the participants in a lockdown: to seek shelter within the facility, rather than evacuating. This study was conducted with a small group of volunteer participants in a school setting. The data collected through video observation and analysis provides insights into the modeling of occupant movements as they receive the lockdown notification, and seek appropriate shelter. This paper describes 10 significant patterns observed as students in a hallway seek shelter, including \"Nearest Door Forward, \" \"Collaboration, \" \"Sheltering With Others, \" and \"Going With The Flow\".","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122004051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the relationship between forecast accuracy and detection performance: An application to biosurveillance","authors":"T. Lotze, Galit Shmueli","doi":"10.1109/THS.2008.4534431","DOIUrl":"https://doi.org/10.1109/THS.2008.4534431","url":null,"abstract":"While many methods have been proposed for detecting disease outbreaks from pre-diagnostic data, their performance is usually not well understood. In this paper, we describe the relationship between forecast accuracy and the detection accuracy of a method. We argue that most existing temporal detection methods for biosurveillance can be characterized as a forecasting component coupled with a monitoring/detection component. We show that improved forecasting results in improved detection and we quantify the relationship between forecast accuracy and detection metrics under different scenarios. The forecast accuracy can then be used to rate an algorithm's expected performance in detecting outbreaks. Simulation is used to compare empirical performance with theoretical results; we also show examples with authentic biosurveillance data.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121855258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)","authors":"J. Verba, M. Milvich","doi":"10.1109/THS.2008.4534498","DOIUrl":"https://doi.org/10.1109/THS.2008.4534498","url":null,"abstract":"Current intrusion detection system (IDS) technology is not suited to be widely deployed inside a supervisory, control and data acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127790756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}