Security infrastructure for commercial and military ports

Battelle has been developing robust detection and scanning technologies that integrate with existing and future port security systems as part of overall integrated security networks that can be tailored to meet individual requirements for commercial ports or Navy facilities. Major challenges include...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Faulkner, L. L., Kritzstein, B. P., Zimmerman, J. J.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 6
container_issue
container_start_page 1
container_title
container_volume
creator Faulkner, L. L.
Kritzstein, B. P.
Zimmerman, J. J.
description Battelle has been developing robust detection and scanning technologies that integrate with existing and future port security systems as part of overall integrated security networks that can be tailored to meet individual requirements for commercial ports or Navy facilities. Major challenges include the water side issues such as geography, bathymetry, channel dimensions, changing bottom topology, environmental conditions, operation under all conditions and sea states suitable for vessel and small craft operation, harbor arrangement, and port-specific unique threats. However, many port security systems develop and implement new sensor technologies rather than assess the overall security need-that is, they follow a technology push rather than a market pull approach. While stated security approaches may integrate sensor data, stored data, intelligence databases, and human observations in various forms and formats, they generally do not provide the port-specific vulnerability and threat information required to alert security personnel with an integrated, composite threat analysis. Most approaches depend upon real-time person-in-the-loop detection strategies that can falter when faced with real world constraints: limited personnel resources, human fatigue and error, distractions, and misinterpretation of anomalies. Statistical and probabilistic analyses for anomaly identification are necessary to provide viable potential threat solution sets. Starlight™, a Battelle developed software tool, combines information from multiple sources and multiple formats into a single information management and analysis composite to identify anomalies and threats. The system rapidly integrates text, network, geospatial, and temporal data, and then processes the disparate information to provide one cohesive threat solution to alert security staff. This synergistic approach enables multiple data base and information formats to be addressed holistically instead of through stovepipes, giving the ability to uncover a threat pattern within the otherwise overwhelming amount of information. Starlight™ differs from traditional systems by incorporating a range of processing algorithms to analyze individual information streams and form a composite threat solution. Current applications include intelligence gathering, network intrusion, entity extraction, law enforcement, visual intelligence (VISINT) processing, and threat anticipation. The overall strategy is the identification of appropriat
doi_str_mv 10.23919/OCEANS.2011.6107174
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6107174</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6107174</ieee_id><sourcerecordid>6107174</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-1c01ab350cdfbfb54263911f1a2a944ae01e50cc267f4313844664221c2eb03f3</originalsourceid><addsrcrecordid>eNotj8FqwzAQRFXaQtPUX9Ae9AN2tVpZ8h5DSNNCaA7JPciKBAI7DrJ8yN_X0JzmMMzwHmMfICqJBPS5X29Wv4dKCoBKgzBg1AMryDSCEKk2SM0jewVVGwNKGvnEFgLIlAab-oUV4xjbeaoFYEMLRgfvphTzjcdLSHbMaXJ5Sp6HIXE39L1PLtqO28uZ97GL2aYbvw4pj2_sOdhu9MU9l-z4tTmuv8vdfvuzXu3KSCKX4ATYFmvhzqENba2kni0ggJWWlLJegJ9LJ7UJCmcmpbRWUoKTvhUYcMne_2-j9_50TbGfCU53cfwDtWlKtg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security infrastructure for commercial and military ports</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Faulkner, L. L. ; Kritzstein, B. P. ; Zimmerman, J. J.</creator><creatorcontrib>Faulkner, L. L. ; Kritzstein, B. P. ; Zimmerman, J. J.</creatorcontrib><description>Battelle has been developing robust detection and scanning technologies that integrate with existing and future port security systems as part of overall integrated security networks that can be tailored to meet individual requirements for commercial ports or Navy facilities. Major challenges include the water side issues such as geography, bathymetry, channel dimensions, changing bottom topology, environmental conditions, operation under all conditions and sea states suitable for vessel and small craft operation, harbor arrangement, and port-specific unique threats. However, many port security systems develop and implement new sensor technologies rather than assess the overall security need-that is, they follow a technology push rather than a market pull approach. While stated security approaches may integrate sensor data, stored data, intelligence databases, and human observations in various forms and formats, they generally do not provide the port-specific vulnerability and threat information required to alert security personnel with an integrated, composite threat analysis. Most approaches depend upon real-time person-in-the-loop detection strategies that can falter when faced with real world constraints: limited personnel resources, human fatigue and error, distractions, and misinterpretation of anomalies. Statistical and probabilistic analyses for anomaly identification are necessary to provide viable potential threat solution sets. Starlight™, a Battelle developed software tool, combines information from multiple sources and multiple formats into a single information management and analysis composite to identify anomalies and threats. The system rapidly integrates text, network, geospatial, and temporal data, and then processes the disparate information to provide one cohesive threat solution to alert security staff. This synergistic approach enables multiple data base and information formats to be addressed holistically instead of through stovepipes, giving the ability to uncover a threat pattern within the otherwise overwhelming amount of information. Starlight™ differs from traditional systems by incorporating a range of processing algorithms to analyze individual information streams and form a composite threat solution. Current applications include intelligence gathering, network intrusion, entity extraction, law enforcement, visual intelligence (VISINT) processing, and threat anticipation. The overall strategy is the identification of appropriate sensors for integration into multiple real time data sets that combine sensor data with stored data, intelligence information, and human observations in various forms and formats. Individual data bases and sensor streams are processed with algorithms appropriate for their content and format. Data fusion, processing, statistical and probabilistic criterion provide synergistic solution sets that are ranked to identify threats and to select appropriate responses ranging from nonlethal deterrents to disabling force. Implementation strategies assimilate data and information necessary to process and identify risks compatible with and supportive of security personnel functions. Critical implementation requirements for adding or expanding port security systems include minimal impact to vessel traffic, minimal real-time human monitoring; minimizing false positives and false negatives; calibration; and flexibility to be adapted, expanded, and integrated for port-specific needs. In-water installation issues include secure anchoring and safety, bio-fouling protection, corrosion protection, reliability, availability, ease of maintenance, and life cycle costs. Implementation is accommodated by a spiral building block approach.</description><identifier>ISSN: 0197-7385</identifier><identifier>ISBN: 1457714272</identifier><identifier>ISBN: 9781457714276</identifier><identifier>EISBN: 9780933957398</identifier><identifier>EISBN: 0933957394</identifier><identifier>DOI: 10.23919/OCEANS.2011.6107174</identifier><language>eng</language><publisher>IEEE</publisher><subject>Data Synthesis ; Data visualization ; Database Composites ; Humans ; Information systems ; Personnel ; Port Security ; Security ; Visual Analytics ; Visualization</subject><ispartof>OCEANS'11 MTS/IEEE KONA, 2011, p.1-6</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6107174$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6107174$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Faulkner, L. L.</creatorcontrib><creatorcontrib>Kritzstein, B. P.</creatorcontrib><creatorcontrib>Zimmerman, J. J.</creatorcontrib><title>Security infrastructure for commercial and military ports</title><title>OCEANS'11 MTS/IEEE KONA</title><addtitle>OCEANS</addtitle><description>Battelle has been developing robust detection and scanning technologies that integrate with existing and future port security systems as part of overall integrated security networks that can be tailored to meet individual requirements for commercial ports or Navy facilities. Major challenges include the water side issues such as geography, bathymetry, channel dimensions, changing bottom topology, environmental conditions, operation under all conditions and sea states suitable for vessel and small craft operation, harbor arrangement, and port-specific unique threats. However, many port security systems develop and implement new sensor technologies rather than assess the overall security need-that is, they follow a technology push rather than a market pull approach. While stated security approaches may integrate sensor data, stored data, intelligence databases, and human observations in various forms and formats, they generally do not provide the port-specific vulnerability and threat information required to alert security personnel with an integrated, composite threat analysis. Most approaches depend upon real-time person-in-the-loop detection strategies that can falter when faced with real world constraints: limited personnel resources, human fatigue and error, distractions, and misinterpretation of anomalies. Statistical and probabilistic analyses for anomaly identification are necessary to provide viable potential threat solution sets. Starlight™, a Battelle developed software tool, combines information from multiple sources and multiple formats into a single information management and analysis composite to identify anomalies and threats. The system rapidly integrates text, network, geospatial, and temporal data, and then processes the disparate information to provide one cohesive threat solution to alert security staff. This synergistic approach enables multiple data base and information formats to be addressed holistically instead of through stovepipes, giving the ability to uncover a threat pattern within the otherwise overwhelming amount of information. Starlight™ differs from traditional systems by incorporating a range of processing algorithms to analyze individual information streams and form a composite threat solution. Current applications include intelligence gathering, network intrusion, entity extraction, law enforcement, visual intelligence (VISINT) processing, and threat anticipation. The overall strategy is the identification of appropriate sensors for integration into multiple real time data sets that combine sensor data with stored data, intelligence information, and human observations in various forms and formats. Individual data bases and sensor streams are processed with algorithms appropriate for their content and format. Data fusion, processing, statistical and probabilistic criterion provide synergistic solution sets that are ranked to identify threats and to select appropriate responses ranging from nonlethal deterrents to disabling force. Implementation strategies assimilate data and information necessary to process and identify risks compatible with and supportive of security personnel functions. Critical implementation requirements for adding or expanding port security systems include minimal impact to vessel traffic, minimal real-time human monitoring; minimizing false positives and false negatives; calibration; and flexibility to be adapted, expanded, and integrated for port-specific needs. In-water installation issues include secure anchoring and safety, bio-fouling protection, corrosion protection, reliability, availability, ease of maintenance, and life cycle costs. Implementation is accommodated by a spiral building block approach.</description><subject>Data Synthesis</subject><subject>Data visualization</subject><subject>Database Composites</subject><subject>Humans</subject><subject>Information systems</subject><subject>Personnel</subject><subject>Port Security</subject><subject>Security</subject><subject>Visual Analytics</subject><subject>Visualization</subject><issn>0197-7385</issn><isbn>1457714272</isbn><isbn>9781457714276</isbn><isbn>9780933957398</isbn><isbn>0933957394</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj8FqwzAQRFXaQtPUX9Ae9AN2tVpZ8h5DSNNCaA7JPciKBAI7DrJ8yN_X0JzmMMzwHmMfICqJBPS5X29Wv4dKCoBKgzBg1AMryDSCEKk2SM0jewVVGwNKGvnEFgLIlAab-oUV4xjbeaoFYEMLRgfvphTzjcdLSHbMaXJ5Sp6HIXE39L1PLtqO28uZ97GL2aYbvw4pj2_sOdhu9MU9l-z4tTmuv8vdfvuzXu3KSCKX4ATYFmvhzqENba2kni0ggJWWlLJegJ9LJ7UJCmcmpbRWUoKTvhUYcMne_2-j9_50TbGfCU53cfwDtWlKtg</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Faulkner, L. L.</creator><creator>Kritzstein, B. P.</creator><creator>Zimmerman, J. J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201109</creationdate><title>Security infrastructure for commercial and military ports</title><author>Faulkner, L. L. ; Kritzstein, B. P. ; Zimmerman, J. J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-1c01ab350cdfbfb54263911f1a2a944ae01e50cc267f4313844664221c2eb03f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Data Synthesis</topic><topic>Data visualization</topic><topic>Database Composites</topic><topic>Humans</topic><topic>Information systems</topic><topic>Personnel</topic><topic>Port Security</topic><topic>Security</topic><topic>Visual Analytics</topic><topic>Visualization</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Faulkner, L. L.</creatorcontrib><creatorcontrib>Kritzstein, B. P.</creatorcontrib><creatorcontrib>Zimmerman, J. J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Faulkner, L. L.</au><au>Kritzstein, B. P.</au><au>Zimmerman, J. J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security infrastructure for commercial and military ports</atitle><btitle>OCEANS'11 MTS/IEEE KONA</btitle><stitle>OCEANS</stitle><date>2011-09</date><risdate>2011</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>0197-7385</issn><isbn>1457714272</isbn><isbn>9781457714276</isbn><eisbn>9780933957398</eisbn><eisbn>0933957394</eisbn><abstract>Battelle has been developing robust detection and scanning technologies that integrate with existing and future port security systems as part of overall integrated security networks that can be tailored to meet individual requirements for commercial ports or Navy facilities. Major challenges include the water side issues such as geography, bathymetry, channel dimensions, changing bottom topology, environmental conditions, operation under all conditions and sea states suitable for vessel and small craft operation, harbor arrangement, and port-specific unique threats. However, many port security systems develop and implement new sensor technologies rather than assess the overall security need-that is, they follow a technology push rather than a market pull approach. While stated security approaches may integrate sensor data, stored data, intelligence databases, and human observations in various forms and formats, they generally do not provide the port-specific vulnerability and threat information required to alert security personnel with an integrated, composite threat analysis. Most approaches depend upon real-time person-in-the-loop detection strategies that can falter when faced with real world constraints: limited personnel resources, human fatigue and error, distractions, and misinterpretation of anomalies. Statistical and probabilistic analyses for anomaly identification are necessary to provide viable potential threat solution sets. Starlight™, a Battelle developed software tool, combines information from multiple sources and multiple formats into a single information management and analysis composite to identify anomalies and threats. The system rapidly integrates text, network, geospatial, and temporal data, and then processes the disparate information to provide one cohesive threat solution to alert security staff. This synergistic approach enables multiple data base and information formats to be addressed holistically instead of through stovepipes, giving the ability to uncover a threat pattern within the otherwise overwhelming amount of information. Starlight™ differs from traditional systems by incorporating a range of processing algorithms to analyze individual information streams and form a composite threat solution. Current applications include intelligence gathering, network intrusion, entity extraction, law enforcement, visual intelligence (VISINT) processing, and threat anticipation. The overall strategy is the identification of appropriate sensors for integration into multiple real time data sets that combine sensor data with stored data, intelligence information, and human observations in various forms and formats. Individual data bases and sensor streams are processed with algorithms appropriate for their content and format. Data fusion, processing, statistical and probabilistic criterion provide synergistic solution sets that are ranked to identify threats and to select appropriate responses ranging from nonlethal deterrents to disabling force. Implementation strategies assimilate data and information necessary to process and identify risks compatible with and supportive of security personnel functions. Critical implementation requirements for adding or expanding port security systems include minimal impact to vessel traffic, minimal real-time human monitoring; minimizing false positives and false negatives; calibration; and flexibility to be adapted, expanded, and integrated for port-specific needs. In-water installation issues include secure anchoring and safety, bio-fouling protection, corrosion protection, reliability, availability, ease of maintenance, and life cycle costs. Implementation is accommodated by a spiral building block approach.</abstract><pub>IEEE</pub><doi>10.23919/OCEANS.2011.6107174</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0197-7385
ispartof OCEANS'11 MTS/IEEE KONA, 2011, p.1-6
issn 0197-7385
language eng
recordid cdi_ieee_primary_6107174
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Data Synthesis
Data visualization
Database Composites
Humans
Information systems
Personnel
Port Security
Security
Visual Analytics
Visualization
title Security infrastructure for commercial and military ports
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T10%3A13%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20infrastructure%20for%20commercial%20and%20military%20ports&rft.btitle=OCEANS'11%20MTS/IEEE%20KONA&rft.au=Faulkner,%20L.%20L.&rft.date=2011-09&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=0197-7385&rft.isbn=1457714272&rft.isbn_list=9781457714276&rft_id=info:doi/10.23919/OCEANS.2011.6107174&rft_dat=%3Cieee_6IE%3E6107174%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780933957398&rft.eisbn_list=0933957394&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6107174&rfr_iscdi=true