PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
The mobile access control vestibule (MACV) is an adaptation of techniques developed for mobile military command centers. The overall configuration of modules acts as an entry control/screening facility or transportable command center. The system would provide the following capabilities: (1) A key element for force protection, rapid deployment units sent to areas having no prepositioned equipment or where there has been a degradation of that equipment as a result of natural disasters or civil unrest. (2) A rapidly deployable security control center to upgrade the security at nonmilitary sites (e.g., diplomatic or humanitarian organizations). (3) Personnel screening, package screening, badge/identification card production for authorized personnel, centralized monitoring of deployed perimeter sensors, and centralized communications for law enforcement personnel. (4) Self-contained screening and threat detection systems, including explosives detection using the system developed by Sandia National Laboratories for the FAA. When coupled with transportable electric generators, the system is self-sufficient. The communication system for the MACV would be a combination of physically wired and wireless communication units that supports by ad hoc networking.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The report deals with the new technologies of control of an integrity of secured objects, indication of unauthorized access to such objects and identification of objects intended for use by law enforcement and security agencies. The data of technologies are based on use of unique optical images, casually formed or fixed by taking of object under monitoring and destroyed by attempt of unauthorized access or breakdown of its integrity. The offered technologies provide procedures and hardware for automatic registration, recognition and identification of unique optical images.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The Advanced System Division of ISI is engaged in a number of projects focused on using commercial technologies to produce a low-cost system with extensive capability for reconfiguration and experimentation. Low-cost platforms for mobile computing and communications enable experimental approaches to determining requirements for law enforcement and military field applications. Unfortunately, flexible COTS hardware is generally unavailable, forcing experiments to make use of costly special-purpose hardware.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
LE Systems has developed a new tool, for today's law enforcement, corrections and military communities. Under the sponsorship of DARPA's Joint Program Steering Group, LE Systems has completed and delivered ten prototype non-lethal laser flashlights. The Laser DazzlerTM is designed to allow the offer to 'reach out' to the suspect and interact at a distance, applying a non-lethal force alternative. The Laser DazzlerTM is essentially a handheld, green, 532 nm diode pumped laser. The 532 nm frequency was chosen for its unique ability to react with the human eye in both daylight and reduced light conditions, causing disorientation and confusion.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In the past several years, there has been increasing interest in acoustic technology for less-than-lethal applications. Pyrotechnic whistles have been under study at the Edgewood Research, Development and engineering Center for several years for similar applications. Improvements in safety and handling, combined with increased levels of acoustic output, make the properly designed pyrotechnic whistle a valuable addition (read augmentation) to some current device designs. Either alone or in combination with other distraction effects, such as multiple concussion, strobing pyrotechnic, or microstarts, the pyrotechnic whistle family of devices provide a high level of target reaction with a minimum of collateral damage. This paper will summarize the recent research and development efforts in pyrotechnic whistle compositions, and the capabilities for the application of pyrotechnic whistles for typical law enforcement applications.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Non-lethal electronic weapons in the form of tasers (a stand-off incapacitation device with a range of about 15 feet) and stun guns (which are not a gun, but a close contact stun device) have been used by law enforcement for over 18 years. The taser has dominated this market, since it does not require the close physical contact (with the resultant injuries) that the stun gun requires. Tasers are effective against even determined assailants where OC or pepper sprays consistently fail. The taser also does not have the close range lethality of low impact munitions. These electronic non-lethal weapons have saved the lives of thousands of suspects and have prevented the injury of thousands of law enforcement officers. Recent advances in laser sight technology have permitted the development of a patented dual laser sight that not only increased accuracy, but have made these weapons even more intimidating, increasing surrender rates. Now increased ranges are feasible and r & d on non-lethal military weapons to replace the anti-personnel landmine has resulted in new, unmanned, non-lethal taser weapons for law enforcement corrections and border patrol perimeter control use.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Surveillance and Assessment Technologies for Law Enforcement
Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the size of a CD ROM drive of a computer.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A number of technologies are being developed for concealed weapon detection (CWD), and use of the appropriate processing techniques will be very important to the success of such technologies. In this paper, signal processing procedures used t enhance the detection of weapons concealed underneath clothing are described and illustrated.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A novel personnel surveillance system has been developed to rapidly obtain 360 degree, full-body images of humans for the detection and identification of concealed threats. Detectable threats include weapons fabricated with metal, plastic, and ceramic, as well as explosive solids and liquids. This new system uses a cylindrical mechanical scanner to move a seven-foot, 384 element, Ka band (26 - 30 GHz) array circumferentially around a person in four to seven seconds. Low power millimeter-waves, which are nonionizing and not harmful to humans, are employed because they readily penetrate clothing barriers and reflect from concealed threats. The reflected waves provide information that is reconstructed into 3-D cylindrical holographic images with high-speed, digital signal processing (DSP) boards. This system is capable of displaying in an animation format eight, sixteen, thirty-two or sixty-four image frames at various aspect angles around the person under surveillance. This new prototype surveillance system is operational and is presently under laboratory testing and evaluation.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A handheld, battery-operated prototype of a remove concealed weapons detector has been built and tested. The concealed weapons detector will enable law enforcement and security officers to detect metallic and nonmetallic weapons concealed beneath clothing remotely from beyond arm's length to about 20 feet. These detectors may be used to: (1) allow hands-off, stand-off frisking of suspects for metallic and nonmetallic weapons; and (2) search for metallic and nonmetallic weapons on cooperative subjects at courthouse entrances and other monitored security portals. We have demonstrated that we image weapons concealed under heavy clothing, not just detect them, at ranges up to 15 feet using the same ultrasound frequency (40 kHz) used by commercial rangefinders. The concealed weapons detector operates much as a rangefinder, but at higher peak fluxes and pulse repetition frequencies. The detector alerts the user to concealed weapons audibly and visibly by detecting ultrasound glints above a body/clothing baseline, and by compensating for changing range and attenuation. The detector locates concealed weapons within a 6-inch illuminated spot at 10 feet. The signal processor eliminates any signal from behind the target.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Video cameras have become a key component for physical security and continue to grow in importance in today's environment. Video cameras often must be installed in remote locations or locations where physical tampering may be a factor. The solution is to transmit the video over wireless communication links. Often, the communication bandwidths are very narrow (typical less than 9.6 kbits). In addition, the image transmission must be made in real time or near time, while still maintaining the integrity or quality of the imagery. This poses a very challenging problem for the transmission of imagery - in particular motion imagery or video. Tridents WaveNet program offers a solution to this problem where the primary objective of this effort is to provide a real time, high quality video compression capability. This paper discusses the WaveNet program with respect to the application of physical security.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Over the past ten years, our goal has been to convert 'High Tech' DoD capabilities into cost-effective tools to help law enforcement people better do their jobs. In many field surveillance operations it is desirable to accurately map the contents of a room or area where access is denied. This presentation will discuss how uniquely crafted radar waves penetrate materials and how the user can determine what is on the other side of a non-metal wall or barrier. The objective of this new technology is to provide accurate surveillance through any non-metal wall. The accuracy and quality of the information depends on the type of wall, the distance from the radar to the wall and the type of radar wave being used. Surveillance in the clear or through interior walls can provide the best resolution and accuracy for mapping and imaging of both moving and nonmoving objects. Penetrations of more dense walls, such as wood and brick, infers longer radar waves with a corresponding reduction in angle resolution, but with good range information. Very dense walls made of reinforced concrete require even longer wave radar signals. In this case, moving target detection is very good, but with reduced range information and relatively poor angle resolution. Physical laws of each situation dictate the type of sensor that can be used and the quality of the surveillance that can be obtained.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This report describes the United states Coast Guard (USCG) Research and Development Center's (R&DC) development of a prototype nighttime photography system, NITE Is (nighttime investigation of telephoto equipment for identification), for use about USCG aircraft. Combining the speed and aerial coverage capability of the HU-25A with a fast, nighttime photography system would be a powerful tool in presenting case documentation again illegal activity. Furthermore, the images from this system must be capable of providing positive ID of suspect registration numbers and/or evidence quality images of suspect activity.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A new type of passive electric field sensor concept that measures extremely low frequency (ELF) electric fields shows promise for detecting low-flying aircraft near, for example, airport runways or national borders. Because different types of aircraft (jets, airplanes, and helicopters) exhibit different signature characteristics, this type of sensor allows basic target classification. Additionally, helicopters generate ELF electric fields with strong spectral lines corresponding to the rotation of the main and tail rotors, so that the sensor can perform passive, noncooperative helicopter identification. Arrays of these sensors can be used to estimate aircraft speed, direction and height above the ground. We developed detailed 3-D models of an electrically charged helicopter and ground-based sensors, and simulated both target fields and sensor responses. We designed and built prototype sensors, which we used to collect data for various aircraft in the field; the collected signatures compare favorably with the simulated date. Our investigations to date indicate that these sensors naturally complement both fixed radars and distributed acoustic sensors; such a sensor could also be used alone as a low-cost and rugged alternative. This paper outlines the ELF sensor concept, the models, and the sensor hardware we used, and compares simulated and collected signatures.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Primex Aerospace Company, under contract with the U.S. Army Armament Research Development & Engineering Center (ARDEC), has developed a portable vehicle capture system for use at vehicle checkpoints. Currently when a vehicle does not stop at a checkpoint, there are three possible reactions: let the vehicle go unchallenged, pursue the vehicle or stop the vehicle with lethal force. This system provides a non-lethal alternative that will stop and contain the vehicle. The system is completely portable with the heaviest component weighing less than 120 pounds. It can be installed with no external electrical power or permanent anchors required. In its standby mode, the system does not impede normal traffic, but on command erects a barrier in less than 1.5 seconds. System tests have been conducted using 5,100 and 8.400 pound vehicles, traveling at speeds up to 45 mph. The system is designed to minimize vehicle damage and occupant injury, typically resulting in deceleration forces of less than 2.5 gs on the vehicle. According to the drivers involved in tests at 45 mph, the stopping forces feel similar to a panic stop with the vehicle brakes locked. The system is completely reusable and be rapidly reset.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The National Institute of Justice has tasked their satellite facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps identify the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion from outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees. In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A comprehensive security system designed and fabricated by the Idaho National Engineering and Environmental Laboratory (INEEL) was installed into the Bannock County Courthouse located in Pocatello, Idaho. The centerpiece of this security system is a portal style weapons detection system that used passive magnetic sensor technology as the basis for detection. The complete security system includes video and audio surveillance operated from a central location. The INEEL concealed weapons detector (CWD) system was installed at three entrances into the courthouse and serves as a testbed for the National Institute of Justice (NIJ) sponsored system. To accept the proposed security system, minor modification to the courthouse entrances and service facilities were required. Construction activity began at the courthouse in September of 19997, and the security system was installed into the courthouse between November 1997 and January of 1998. The system has been full functional since February 1, 1998 and as of April 3, 1998, is responsible for detecting hundreds of illegal knives and two handguns.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Work release details at prisons have been a continuing source of inspection problems for prison wardens. At the Montana State Prison in deer Lodge 400 prisoners leave the prison in the morning to work outside the walls. They return at lunch and again in the evening. Past practice has been to do a 100% pat search and selective strip searches. These procedures are an irritant to both prisoners and prison personnel involved. However, they were felt to be essential based on the quantity of contraband materials being brought into the prison by these work release inmates. BodySearch is an x-ray scanning system which uses backscatter x-ray to form an image of prisoners as they stand next to the system. Typically prisoners are scanned two at a time, with one scan being taken from the back and the second from the front. Although privacy was considered to be an issue, the prisoners have been relived not to have to go through full pat searches and periodic strip searches. The automatic equipment has also sped up the inspection process and eliminated some of the waiting lines. The problem was so bad that one warden was contemplating having all prisoners issued two sets of clothing (a several hundred thousand dollar investment), which they would change on the way in and out of the prison facility. The new system has all but eliminated any attempt by prisoners to smuggle contraband into the prison by concealing it on their person as they return from work detail. Operationally, a pencil beam is generated by a rotating chopper, which scans horizontally as it is moved vertically. Scintillator detectors mounted adjacent and parallel to the direction of the scanning beam collect the scattered radiation. The result is a photo-like image of the body surface facing the system. The use of a scanning pencil beam in a backscatter geometry with a 140 kV x-ray source eliminates any issue of radiation safety. In fact, the dose delivered by the system (under 10 micro rem for a two-scan inspection) is less than 1% of the dose a person standing outside at sea level receives from background radiation in a day.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper describes the design process of physical security as applied to a U.S. Border Port of Entry (PoE). Included in this paper are descriptions of the elements that compose U.S. border Security. The physical security design will describe the various elements that make up the process, as well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry and exit of illegal contraband will be emphasized.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Optical fingerprint security verification is gaining popularity, as it has the potential to perform correlation at the speed of light. With advancement in optical security verification techniques, authentication process can be almost foolproof and reliable for financial transaction, banking, etc. In law enforcement, when a fingerprint is obtained from a crime scene, it may be blurred and can be an unhealthy candidate for correlation purposes. Therefore, the blurred fingerprint needs to be clarified before it is used for the correlation process. There are a several different types of blur, such as linear motion blur and defocus blur, induced by aberration of imaging system. In addition, we may or may not know the blur function. In this paper, we propose the non-singularity inverse filtering in frequency/power domain for deblurring known motion-induced blur in fingerprints. This filtering process will be incorporated with the pow spectrum subtraction technique, uniqueness comparison scheme, and the separated target and references planes method in the joint transform correlator. The proposed hardware implementation is a hybrid electronic-optical correlator system. The performance of the proposed system would be verified with computer simulation for both cases: with and without additive random noise corruption.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
We investigate the recognition of fingerprints from the Fourier spectrum. The inherent properties of fingerprints allow a feature extraction and data reduction in the spatial frequency domain. The Fourier representation allows fingerprints to be distinguished from a small and spatially well-defined area. This suggests various schemes to detect the significant information in order to optimize the trade-off between sensitivity and robustness. We show illustrative results which confirm the usefulness of this approach. In addition, the classification of fingerprints from their plane wave spectra allows the design of compact systems, where the Fourier transformation is performed optically, while detection and post-processing is done by electronics. This provides the advantage that both optics and electronics are used in an optimum way to minimize the physical size of the system, as well as the computational load to interpret the detected signal.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The purpose of this presentation is to enlighten the reader on the advancements that have been made in the field of biometrics technology as it relates to government and industrial-type applications. The term 'biometrics' is defined as, 'Any technology that uses electronically scanned graphical information for identification purposes.' Biometric technology was for a long time in the experimental stages, with many BETA test projects that were really not applicable to industrial markets. During the course of this presentation, we will show that biometrics applications do work, can develop positive returns on investment, but from a security standpoint have some major application problems that still need to be overcome. We will also address which biometric technologies have a better future in the security world than others.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Security programs are frequently based on a security manager's intuition about an organization's needs and requirements. In some cases, security programs are developed based on the last security incident and are designed to simply defend against that ad hoc exposure. This paper argues for a different approach, in which the business requiring safeguards is analyzed, specific needs defined, and security countermeasures selected based on a strategy to protect the most critical assets of the organization.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are considering. It is imperative that the design for new schools incorporate good security practices, which will rarely increase new building costs if included in the initial planning.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A spent cartridge case exhibits characteristic markings (firearm fingerprint) that can be used to identify the type, and possibly make, of weapon in which the cartridge was fired. This paper details research into the use of discriminant analysis for the purpose of matching spent cartridge cases to specific make and model of firearms. A fired projectile can also be analyzed by measuring the class characteristics such as land mark, groove, mar, and twist ratio. A personal computer (PC) based prototype software application called FireBall will also be described in detail.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Public transportation facilities in the United States are vulnerable to attack by terrorists using chemical agents. This paper focuses on the problem of protecting the people in underground subway stations, which are among the most difficult facilities to protect. A nerve agent can produce symptoms in seconds to minutes, so immediate triggering of evacuation alarms and initiation of mitigation measures is necessary to minimize casualties in the station. The question of whether currently available chemical detectors are sufficiently capable and reliable to enable an automated response is addressed and augmentation possibilities are discussed. A number of concepts for mitigating chemical attacks are explored and their applicability to other transportation facilities is discussed. A possible near-term mitigation measure that is reviewed in some detail is the use of water sprays to scrub gasses and aerosols from the air. This technique may have applicability in the station at the point of agent release, as well as for detoxification of the air stream if selective venting is employed. Calculations show that with proper spray nozzle selection, the water pressure and flow rate available at some subway stations for fire suppression is sufficient for effective removal of Sarin from an air stream.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Trinitrotoluene (TNT) is a high explosive used in most antipersonnel and antitank landmines. The Institute for Biological Detection Systems (IBDS) has developed a quantitative vapor delivery system, termed olfactometer, for conducting canine olfactory research. The research is conducted utilizing dynamic conditions, therefore, it is imperative to evaluate the headspace of TNT to ensure consistency with the dynamic generation of vapor. This study quantified the vapor headspace of military- grade TNT utilizing two different vapor generated methodologies, static and dynamic, reflecting differences between field and laboratory environments. Static vapor collection, which closely mimics conditions found during field detection, is defined as vapor collected in an open-air environment at ambient temperature. Dynamic vapor collection incorporates trapping of gases from a high flow vapor generation cell used during olfactometer operation. Analysis of samples collected by the two methodologies was performed by gas chromatography/mass spectrometry and the results provided information with regard to the constituents detected. However, constituent concentration did vary between the sampling methods. This study provides essential information regarding the vapor constituents associated with the TNT sampled using different sampling methods. These differences may be important in determining the detection signature dogs use to recognize TNT.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Dogs are capable of detecting and discriminating a number of compounds constituting a complex odor. However, they use only a few of these to recognize a substance. The focus of this research is to determine the compounds dogs learn to use in recognizing explosives. This is accomplished by training dogs under behavioral laboratory conditions to respond differentially on separate levers to 1) blank air, 2) a target odor, such as an explosive, and 3) all other odors (non-target odors). Vapor samples are generated by a serial dilution vapor generator whose operation and output is characterized by GC/MS. Once dogs learn this three-lever discrimination, testing sessions are conducted containing a number of probe trials in which vapor from constituent compounds of the target is presented. Which lever the dogs respond to on these probe trials indicates whether they can smell the compound at all (blank lever) or whether it smells like toe target odor (e.g., the explosive) or like something else. This method was conducted using TNT, C-4, and commercial dynamite. The data show the dogs' reactions to each of the constituent compounds tested for each explosive. Analysis of these data reveal the canine detection odor signature for these explosives.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The Airport Vulnerability Assessment Project (AVAP) is the direct result of congressional funding of recommendation 3.13 of the White House Commission on Aviation Safety and Security. This project takes a new approach to the assessment of U.S. commercial airports. AVAP uses automation, analytical methods and tools to evaluate vulnerability and risk, and to analyze cost/benefits in a more quantitative manner. This paper addresses both the process used to conduct this program, as well as a generalized look at the results, which have been achieved for the initial airport assessments. The process description covers the acquisition approach, the project structure, and a review of the various methodologies and tools being used by the sever performing organizations (Abacus Technology, Battelle, CTI, Lockwood Greene, Naval Facilities Engineering Service Center, SAIC, and Science & Engineering Associates). The tools described include ASSESS, SAM, RiskWatch, CASRAP, and AVAT. Included in the process is the utilization of an advisory panel made up predominantly of experts from the National Laboratories 9Sandia, Oak Ridge, Argonne and Brookhaven). The results portion addresses the findings and products resulting from the initial airport assessments. High level (unrestricted) summaries of the results are presented, along with initial trends in commonly recommended security improvements (countermeasures). Opportunities for the application of optics technology are identified.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The authors will first analyze current tactics used by emergency personnel when responding to 'standard' emergencies involving transportation systems. Next, the vulnerabilities and the consequences of a terrorist attack on a transportation system. Next the vulnerabilities and the consequences of a terrorist attack on a transportation system in which weapons of mass destruction are employed will be explored. The unique problems associated with the site of an emergency where chemical, nuclear, or biological agents have been employed will be investigated. The use of available or next-ready technologies in the areas of detection devices, personal protective clothing, and decontamination equipment will be examined. Combining this information, we will seek to prove the hypothesis that without the use of new technologies a change in first responder tactics is impossible. However, with the use of advanced technologies we will illustrate how new tactics can produce safe, more effective emergency responses.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Cargo theft has been estimated by the Federal Bureau o Investigations to be $6 billion annually, while others believe it to be more than $10 billion annually. Opportunistic thieves, street gangs, traditional organized crime groups, and new organized crime groups have been targeting cargo. They steal from warehouses, terminals, equipment, truck stops, or any place where freight comes to a rest. With zero inventory levels, our trailers have become virtual warehouses on wheels and easy targets for thieves. Without information and communication cargo thieves can thrive. The industry and law enforcement are forced into being reactive instead of developing proactive policies and procedures. Cargo thieves cross town lines, county lines, state lines and country borders. This makes communication within the law enforcement community imperative. CargoTIPS (cargo theft information processing system) was developed in response to the need for cargo theft information. The system allows us to collect cargo theft statistics to analyze the problem, assess the threat and develop a response on a national level. CargoTIPS includes a bulletin board, which allows users to communicate with each other, pass on alerts or seek information. The system is also used as an investigative tool. CargoTIPS can identify the mode of transportation (truck, small parcel, air, rail or ocean). It was designed to take in international data. Currently the system has identified that food products are the number one targeted commodity, followed by electronic products and third, computers and computer parts.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
As a result of its relatively short wavelength, coupled with relatively high penetration of many materials, millimeter-wave imaging provides a powerful tool for the detection of concealed articles. By using a passive approach such as that implemented here, it is possible to image (detect) concealed weapons and articles or look through certain types of walls, all without generating any form of radiation that might raise health concerns. In this paper, we present details of the upgrades to our imager that will result in a wide field of view imaging at better than 20 Hz frame rate and with an instantaneous sensitivity of better than 5 Kelvin. High resolution image data taken at stand-off distances of 12 to 27 feet are presented as representing state-of-the-art in passive millimeter-wave imaging. Details of the next generation passive imager, which will produce true real-time images with better than 1 Kelvin sensitivity will be discussed.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
X-ray systems capable of scanning semitrailers using conventional fanbeam technology are restricted to transmission-based imaging techniques that suffer from superposition of clutter. MobileSearchTM I is a truck-mounted 450 KeV pencil beam system incorporating x-ray backscatter imaging to produce near photo-like images, which was reported on in a paper by Swift in 1996. Since that time MobileSearchTM II added a transmission detector providing both backscatter and transmission in a single pass. The transmission detector design is the result of extensive x-ray and optical simulations. The radiation safety was studied extensively using the GEANT2 simulation system. The simulations were extended from 450 KeV to 5 MeV, to determine the safety implications of increasing the x-ray energy. Operationally, a 14 foot high, 8 foot 6 inch wide vehicle can be parked on a level area and the MobileSearchTM II system driven alongside to examine the contents. Deployment and setup are facilitated by having a self-contained system, which can be driven over the road and cen be operational in less than an hour. MobileSearchTM II is also capable of continuous mode scanning. In this mode, a line of vehicles can be scanned without having to stop and reposition or queue vehicles. The system is designed to fit in a C17 for easy air transport to a distant location.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Recent efforts at the Idaho National Engineering and Environmental Laboratory (INEEL) have included mapping explosive contamination resulting from manufacturing and carrying improvised explosive devices (IEDs). Two types of trace detection equipment were used to determine levels of contamination from designated sampling areas. A total of twenty IEDs were constructed: ten using TNT and ten using C-4. Two test scenarios were used. The first scenario tracked the activities of a manufacturer who straps the device onto an independent courier. The courier then performed a series of activities to simulate waiting in an airport. The second scenario tracked the activities of a manufacturer who also served as the courier. A sample set for each test consisted of thirty samples from various locations on each IED manufacturer, thirty from each IED courier, twenty-five from the manufacturing area, and twenty-five from the courier area. Pre-samples and post-samples were collected for analysis with each detection technique. Samples analyzed by gc/chemiluminescence were taken by swiping a teflon- coated sampling swipe across the surface of the sampling area to pick up any explosive particles. Samples analyzed by ion mobility spectrometry (IMS) were taken from the clothing of the manufacturer and courier by vacuuming the surface and collecting particulates on a fiberglass filter. Samples for IMS analysis from the manufacturing and courier rooms were taken by wiping a cotton sampling swipe across the surface area. Currently, building IEDs and monitoring the explosive contamination is being directed toward detection with portal monitors.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A Pulsed Fast Neutron Analysis (PFNA) system for the inspection of cargoes and trucks has been designed to be relocatable. The modular packaging of the component subsystems allows it to be installed and relocated relatively quickly to meet shifting threats. A variety of deployment scenarios have been considered in the design. The material specific detection capabilities of the PFNA system have been extended beyond drugs and explosives to the detection of chemical weapons and special nuclear materials. An existing fixed-site PFNA system has been used to measure signals from a simulated chemical weapon (Sarin) concealed in a variety of cargoes; algorithms for the detection and location of the Sarin have been developed. A microsecond 'macro-pulsing,' added to the injector portion of the PFNA neutron production module, and added neutron detectors, allow measurement of delayed fission neutrons from concealed special nuclear materials (SNM). Measurements carried out with an enriched uranium sample demonstrated that the concealed SNM can be detected in cargoes. This paper will give an overview of the development program and review measurement results.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Extensive testing and simulations have been used to evaluate the transmission imaging capabilities of practical systems for inspecting cargo using x-ray sources ranged from 0.45 MeV to 10 MeV. In particular, the distance between the source and the cargo was constrained to be large enough to insure that the x-ray beam covered the entire cargo, the power of the electron beam was kept constant, and the scan speed of the inspection was fixed. The increased cost of the x-ray generating systems and facilities with high energy have been ignored. The results indicate that there is greater penetration for detecting radiographically thick objects behind steel as the energy is increased to about 5 MeV. Above 5 MeV the operational penetration actually decreases. Even if the energy is sufficient to penetrate a thick cargo, relatively large fluxes in the high energy portion of the x-ray spectrum are required to produce sufficient contrast for detecting moderate quantities of contraband. The relative fluxes required to produce equivalent image quality (contrast) are calculated for energies between 0.45 MeV and 10 MeV.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Dogs are often required to detect target substances under challenging conditions. One of these challenges is to detect contraband in the presence of extraneous odors, whether they are part of the ambient environment or placed there for the purpose of evading detection. This paper presents the results of two studies evaluating the ability of dogs to detect target substances in the presence of varying concentrations of extraneous odors. The studies were conducted under behavioral laboratory conditions, providing good control over vapor sources and a clear basis for evaluation of detection responses. Dogs were trained to sample an air stream consisting of the extraneous odor only or the extraneous odor plus the target odor and then press the appropriate lever to earn food. The results are described in terns of the ability of dogs to detect target odors in the presence of a wide range of concentrations of the extraneous odors.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The drug problem in the U.S. is serious and efforts to fight it are constrained by the lack of adequate means to curb the inflow of smuggled narcotics into the country through cargo containers. Also, events such as the disastrous explosion in Oklahoma City, the IRA bombing in London, and the bombing of the U.S. military residence in Dharan make the development of new tools for the detection of explosives and drugs in vehicles imperative. Thermal neutron analysis (TNA) technology, developed for the detection of explosives in suitcases, and detection of landmines and unexploded ordnance is presently being applied to the nonintrusive detection of significant amounts of explosives and drugs concealed in cars, trucks and large cargo containers. TNA technology is based on the analysis of characteristic gamma rays emitted following thermal neutron capture. A TNA system can be used in a variety of operational scenarios, such as inspection before an unloaded cargo container from a spit is moved to temporary storage, inspection of trucks unloaded from a ferry, or inspection of vehicles parked close to Federal building or military bases. This paper will discuss the detection process and operational scenarios, and will present results from recent simulations and measurements.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The VACIS-I prototype system, which has been used at U.S.- Mexico POEs for cargo truck and railroad freight-car inspections, has served as a seedbed for other vehicle inspection systems that are cost-effective, transportable, high- speed, reliable, and utilize very low level radiation exposure. The STAR (stolen automobile recovery) system has been developed and successfully tested at Miami, Florida. Its status and further developmental possibilities are discussed. VACIS-II, the high-resolution (0.5 inches versus 2 inches for VACIS-I) system that scans the entire cargo truck, including the van, is capable of conducting normal as well as oblique scans in 1 1/2 minutes. Railroad VACIS, dubbed SENTINEL, which will scan railroad cars entering the U.S. at about 5 mph is now under development. It has the option of utilizing a Co-60 source for inspecting heavier cargoes. In addition, MOBILE VACIS is in the planning stage. As presently envisioned, it will be mounted on a small vehicle with an extendable detector tower and deployable gamma-ray source to scan a suspect vehicle, either a passenger car or cargo truck, for contraband. The state of development of these systems, as well as some of the options and concerns, are presented.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Fast GC (gas chromatography) - IMS (ion mobility spectrometry) as a core technology is sufficiently flexible with respect to a broad range of chemical detection capabilities. The application of this dual technology can provide unique solutions in many operational environments. GC-IMS is the next evolutionary step in the advancement of IMS technology. Using the advantages of IMS (i.e., small, high sensitivity, rugged, operates at atmospheric pressure, etc.) And the chemical selection capability of GC, this detector configuration can be customized to detect and identify explosives, ICAO markers, and narcotics. This paper will present a technical discussion on GC-IMS and describe several commercial off the shelf (COTS) systems with potential application in many operating environments. Instruments include the Orion for explosives detection, Ariel for narcotics detection, Sirius for both explosives and narcotics detection, and NorthStar for handheld narcotics detection.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
We discuss a trace explosive detection portal for high-volume personnel screening, which has been developed recently at Sandia National Laboratories (SNL), using funding provided by the Federal Aviation Administration (FAA) and the Department of Energy (DOE) Office of Safeguards and Security (OSS). This portal screens individuals for explosives using noninvasive means to collect explosive residue in the forms of vapor and particulate contamination. The portal combines a commercially available ion mobility spectrometer (IMS) with a preconcentrator developed at SNL to perform detection of explosives. The prototype portal has undergone one series of tests at the Albuquerque International Airport, and we are now proceeding to develop an improved, second-generation portal, and to find a company to market the portal.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A relatively inexpensive and reliable method was developed to generate vapor pulses of explosives using 2,4,6 trinitrotoluene (TNT) for proof of concept. The technology developed in vapor generation and collection was integrated with ion mobility spectrometry (IMS) as the primary analytical tool, keeping in mind utility in field scenarios. The use of the technology was demonstrated in evaluating different surfaces for adsorption of TNT vapors from a low air flow. Of the ten materials examined, teflon was found to be the best substrate for adsorption, retention, and subsequent recovery of TNT using ion mobility spectrometry for analysis. The present work has also illustrated that TNT is bound more strongly on some surfaces than others. It was also shown that decomposition of small amounts of TNT on quartz fiber membranes occurs rapidly in the temperature range 235-250 degree(s)C as evidenced by the collection and determination of NO3 away from the surface. The experimental apparatus developed for generation of vapor pulses can be used to study the decomposition of small amounts of explosives as a function of surface, and temperature in the presence and absence of air, and in a static environment or in a flowing gas stream.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Ion mobility spectrometry (IMS) is often used in the detection of explosives and drugs in the laboratory and field scenarios. It is gaining popularity in the semiquantitative analysis of these and related compounds. We have successfully used IMS in studies with cocaine, 2,4,6 trinitrotoluene (TNT) and similar chemicals, and have developed a protocol to access and ensure the quality of our data. This protocol employs TNT as the reference standard in the IMS negative mode and cocaine hydrochloride as the reference standard in the IMS positive mode. A five-point calibration curve is normally generated for each reference compound in order to determine a concentration level suitable for quality control (QC) check solutions. We have established peak amplitudes and reduced mobility constants for the QC solutions that must be met each day before proceeding with analyses. Any deviation from these criteria requires assessment of the problem and appropriate corrective action. We have found this procedure helpful in maintaining data quality, and in providing an early indication of potential problems. The present paper focuses on the use of IMS with explosives though several examples are given with cocaine hydrochloride.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
There are two irreversible trends in law enforcement communications today, which are putting contradictory pressures on the need for communications security. The first is the increasing sophistication of the adversary, and the adversary's ability to intercept and monitor wireless communications. The second is law enforcement's increasing reliance on commercial solutions to wireless communications. The providers of commercial solutions do not provide high grades of security being limited by financial feasibility and technical expertise. Exacerbating this situation is the fact that there are only two current alternatives to law enforcement communications security; the traditional DES encryption and the U.S. government's Type 1 high- grade encryption. The former is no longer sufficiently robust against sophisticated adversaries, and the latter is encumbered by restrictions of use. The need is for an encryption technology that combines the advantages of the government's high grade security, with the cost efficiency of a reprogrammable, commercially produced, encryption module. The Harris Secure Products group has research and development underway which will enable such a next generation encryption module, project named Sierra. The Sierra objective is a programmable device, capable of providing Type 1 (U.S. government), Type 3, and Type 4, or a combination thereof. The device also facilitates the necessary voice processing algorithms to support legacy and future equipment. Unlike current Type 1 devices, a module based on Sierra would not be subject to controlled handling procedures when not programmed for Type 1 applications. This allows for law enforcement agencies to downgrade and upgrade their communications equipment appropriate to the adversary, and according to interoperability requirements. This paper will describe the various technologies and techniques being used in the development of the Sierra.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The use of high pressure water streams to disperse crowds, in general, and to subdue unruly individuals in a prison environment has been shown to be an effective way to reduce the severity of the confrontations among the inmates and guards. The less lethal chemical delivery system (Hydro-Force) disperses chemicals, such as oleoresin capsicum or 'pepper spray' (OC), in the high pressure water stream. The high pressure water stream is aimed to impact the target individuals. A close miss overhead is still very effective as the water mixture can 'ran' on them and soak the target individuals. The effect of the OC is multiplied by the whole body exposure with excellent results in stopping any undesirable behavior of the target individuals, without bodily contact or struggle with the guards. The possibility of producing blunt trauma damage by the impact of the water stream, at close range, was a concern to be investigated. The water stream can be considered as a special fluid kinetic energy projectile. At impact, the kinetic energy of the mass and velocity of the stream of water is dissipated and its momentum is transferred to the target. The purpose of this cursory study is to evaluate whether the physiological effects of this impact is below the threshold of damage or lethality. Comparisons are made, where the two crucial elements, the force coupled to the target and the duration of its application, in order to establish the probably level of blunt trauma associated with the use of the water jet.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.