NCJ Number
57737
Editor(s)
J S JACKSON
Date Published
1977
Length
253 pages
Annotation
PROCEEDINGS OF THE 1977 CARNAHAN CONFERENCE ON CRIME COUNTERMEASURES PRESENT NUMEROUS TECHNICAL PAPERS ON COMPUTER SECURITY, POLICE COMMUNICATIONS, AND OTHER TOPICS FOR SCIENTISTS AND ENGINEERS.
Abstract
A VARIETY OF CRIME CONTROL PROBLEMS DISCUSSED RANGE FROM NUCLEAR PERSONNEL ACCESS CONTROL (INFORMATION ON HARDWARE SYSTEMS AND PROCEDURES TO PREVENT ILLEGAL PENETRATION) TO AUTHENTICATION OF TAPE RECORDINGS (SPECIFIC APPROACHES TO THE PROBLEM ARE DESCRIBED). CURRENTLY IN PROGRESS IN ENGLAND IS A PROJECT TO DEVELOP A COMPUTER-BASED MANAGEMENT INFORMATION SYSTEM FOR THE POLICE, USING A POLICE MINI-COMPUTER CONFIGURATION, WITH LINKS TO A REMOTE MAINFRAME FOR LONG-TERM DATA STORAGE AND PROCESSING. LOW-COST PERSONAL ALARM SYSTEMS ARE INTRODUCED FOR RESIDENCES AND BUSINESSES; THE HARDWARE FOR ONE OF THESE CONSISTS OF SMALL ACTUATORS IN WRISTWATCH OR PENDANT FORM THAT ARE CARRIED BY CITIZENS, A NETWORK OF WALL- OR POSTMOUNTED RECEIVER RELAYS, AND A CENTRAL MONITORING STATION AT THE RESPONSE AGENCY. OTHER TOPICS ADDRESS THE FACTORS INVOLVED IN THE DESIGN OF A MOBILE RADIO COMMUNICATION SYSTEM; USE OF AN ECONOMICAL, SEMIAUTOMATIC FINGERPRINT READER TO FACILITATE FINGERPRINT IDENTIFICATION; THE PROCESS OF DECODING SPEECH FROM TAPE RECORDINGS; AN OVERVIEW OF EXPLOSIVES CONTROL MEASURES; AND DEVELOPMENTS IN VEHICULAR AND AEROSPACE TECHNOLOGY OF USE TO LAW ENFORCEMENT OPERATIONS. THE FEDERAL COMMUNICATION COMMISSION'S PROPOSAL TO PERMIT GREATER UTILITY OF LOW POWER, LIMITED RANGE TRANSMITTERS, PARTICULARLY FOR SECURITY APPLICATIONS, LEADS TO A DISCUSSION OF INTRUSION DETECTION SYSTEMS. COMPUTER SECURITY IS VIEWED BY THE SECURITY OFFICER AND THE POLICE FORENSIC SCIENTIST. COMPUTER TECHNIQUES TO IDENTIFY PICTURES OF HUMAN FACES (AN ISRAELI REPORT) AND BULLETS (USING THE BACKSCATTERED ELECTRON SIGNAL OF A SCANNING ELECTRON MICCOSCOPE) ARE DISCUSSED ALONG WITH A COMPUTER-ASSISTED SYSTEM TO AID IN THE DEPLOYMENT OF POLICE OFFICERS (USED IN TWO-SIZE TEXAS CITIES AND JAPAN). ADDITIONAL DATA ARE GIVEN ON SECURITY TECHNIQUES (THE USE OF A CODE WHICH DETECTS DECEPTION AND CRYPTOGRAPHIC APPLICATION), ALARM SYSTEMS (THE RF ALARM LINK), AND IDENTIFICATION STUDIES (VOICE FEATURES). REFERENCES NOTES AND A LIST OF PUBLICATIONS OF THE OFFICE OF RESEARCH AND ENGINEERING SERVICES OF THE UNIVERSITY OF KENTUCKY ARE PROVIDED. (WJR)