PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
A concern for homeland defense has been with us since the inception of the Republic. However, it has changed in focus and emphasis depending on the nature of the threat we perceived. In the earliest decades the threat was from invasion by a Britain that still did not accept the results of the Revolutionary War. Later the focus shifted to concern about possible attack by ships, and during WW I and WW II, by submarines. With the advent of the intercontinental nuclear-armed bomber in 1950, our focus changed again. When we could be attacked by ballistic missiles after 1960, our concern focused on that threat. Now that we have seen that damaging attacks can be brought to the homeland 'under the radar screen', by terrorist operations, the focus has shifted again. We are now entering an era when we must address potential homeland attacks with weapons of mass destruction (WMD) that may be delivered by a range of means, depending on the source of the attack. In response to this full spectrum of attack modes, the U.S. has implemented a three-stage defense policy that integrates overseas 'offense' and homeland 'defense'. This framework for defense analysis and planning is likely to be with us into the indefinite future.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The ability to perform remote gas identification is critical to Homeland Security missions. LWIR infrared hyperspectral sensor technology is the only total solution for remote gas identification. All aspects of this technology are ready to be transitioned to operational deployment, including sensor design, processing and exploitation capability, and integration with geographical information systems. Many dual-use missions exist for this technology thus increasing the benefit obtained for the sensor system development cost.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Developments in the continental US and the international scene have alerted the defense community to the threat of biological and chemical agents on civilian and military populations. The objective of the program will lead to the protection of US and allied forces from biological/chemical threats. The following focus areas are being developed and integrated in our program: (1) scientific validation; (2) medical countermeasures; and (3) communication and integrated conversion of data to knowledge. We are developing binder elements for the sensors and platforms for these sensor systems. To rapidly determine whether individuals have been exposed to threat agents, archival data sets have been established through a partnership with the Texas Department of Health. Large scale, real-time symptomatic diagnoses of patients from emergency medical facilities are being electronically collected and sent to an archival data facility for identification of emergent disease. The ability to diagnose emergent disease can be reduced to twenty-four hours from the week to several weeks currently required.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Sensing and Prediction of Natural and Other Disasters
Weather information for Command and Control (C2) is usually available through separate weather systems, which are not necessarily implemented to satisfy specific C2 requirements for military end users. This paper describes an integrated approach for weather requirements for the Canadian Air Force Command and Control Information System (AFCCIS). Presentations for observations, forecasts, and weather warnings are made based on near real-time data from the Canadian military weather network. Static runway configuration and aircraft performance data are combined with dynamic weather data to obtain limitations for aircraft operations. Pertinent information is presented in graphical form, including the operational status of air bases on a map background. Additionally, data is obtained periodically from another source for the generation of forecast isotachs, jetstreams, isobars, calculation of contrail possibilities, and the detection of fronts. The weather features have been integrated with a prototype candidate component for AFCCIS.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Biological weapons are within reach of individuals, small groups, terrorist organizations, as well as nations. With pervasive integration of civilian and military populations worldwide, the ill winds of biological warfare stand to affect military troops and civilians alike. A variety of technologies are emerging - such as pathogen detection devices, streaming internet characterization tools, information exploitation techniques, automated feature extraction, and ubiquitous wireless communication - that can help. These technologies, if taken together within an integrated analytical framework, could make possible the monitoring of diverse parameters that may indicate a change in the state of health of a given population - either the emergence of a naturally occurring disease or the outbreak of a disease as a result of hostile intent. This presentation will discuss the application of new information surveillance tools and technologies as they apply to health and disease monitoring, particularly within the context of potential terrorist or hostile nation use of biological warfare. Although discussed within the specific context of health surveillance, the tools and processes described here are generally applicable within other domains of subject matter expertise.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The spectral bandwidth of missile launch detector (MLD) is a key factor that determines the overall performance of the system. For any given scenario the performance of the system is dependent on the atmospheric profile, background clutter, scenario geometry, target signature and many other parameters. This paper will show that the optimal spectral bandwidth for a MLD is scenario dependent. The requirements for a satellite based MLD are different from the requirements for a ground based MLD. Background clutter, signal to noise and atmospheric transmission were examined in order to predict the overall system performance. The simulation presented sevearl dependences between the various physical parameters. A statistical model for the background clutter is presented and incorporated into the simulation procedure.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper presents a demonstrated approach to significantly reduce the cost and schedule of non real-time modeling and simulation, real-time HWIL simulation, and embedded code development. The tool and the methodology presented capitalize on a paradigm that has become a standard operating procedure in the automotive industry. The tool described is known as the Aerospace Toolbox, and it is based on the MathWorks Matlab/Simulink framework, which is a COTS application. Extrapolation of automotive industry data and initial applications in the aerospace industry show that the use of the Aerospace Toolbox can make significant contributions in the quest by NASA and other government agencies to meet aggressive cost reduction goals in development programs. The part I of this paper provided a detailed description of the GUI based Aerospace Toolbox and how it is used in every step of a development program; from quick prototyping of concept developments that leverage built-in point of departure simulations through to detailed design, analysis, and testing. Some of the attributes addressed included its versatility in modeling 3 to 6 degrees of freedom, its library of flight test validated library of models (including physics, environments, hardware, and error sources), and its built-in Monte Carlo capability. Other topics that were covered in part I included flight vehicle models and algorithms, and the covariance analysis package, Navigation System Covariance Analysis Tools (NavSCAT). Part II of this series will cover a more in-depth look at the analysis and simulation capability and provide an update on the toolbox enhancements. It will also address how the Toolbox can be used as a design hub for Internet based collaborative engineering tools such as NASA's Intelligent Synthesis Environment (ISE) and Lockheed Martin's Interactive Missile Design Environment (IMD).
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Achieving effective Homeland Security requires the instantiation of automatic, intelligent and vigilant systems of systems, which integrate a diverse array of sensor, signal, and information processing technologies. While the cost and performance envelopes of in-situ and remote sensing systems continuously improve, synergistically combining these sensory inputs to provide actionable, utilitarian information presents significant but tractable architecting challenges. This paper explores Homeland Security 's critical enabling sensing technologies. It also examines and analyzes in greater depth critical communication and information infrastructure challenges. Only when new communications frameworks, which aggregate relevant data, generate and disseminate mission-critical information products, will we achieve the kind of tailored situational awareness Homeland Security requires.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Sensing and Prediction of Natural and Other Disasters
Combining technology sensed data, even if it is of the same type, has proven to be very difficult for engineers and scientists. In the case of radar (e.g. Radarsat) and electro-optical (e.g. Ikonos) remote sensing from space, there have only been a few techniques developed to aid in the correlation and fusion of these data. With the great expansion of space-based, commercial, electro-optical remote sensing platforms during the last decade, there remains an equal need to developing new forms of data fusion from disparate data sets. This work addresses the commercial remote sensing collection process and compares it to that of acoustical remote sensing collection. In the former case, the data sets are typically two-dimensional 'snap-shots', with embedded pixel data that, in the case of panchromatic electro-optical imagery, is 'stair stepped' shades of gray. Acoustical data sets are, however, continuous. As a matter of fact, they are one-dimensional data streams, which represent, not a moment in time, but a continuous story. This work proposes that there is a better answer to combining disparate forms of data such as electro-optical and acoustical, and offers one suggestion for dealing with these data.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Future of Transnational Security: Architectures and Infrastructures
This paper will review and examine the definitions of Self-Reflection and Active Middleware. Then it will illustrate a conceptual framework for understanding and enumerating the costs of Self-Reflection and Active Middleware at increasing levels of Application. Then it will review some application of Self-Reflection and Active Middleware to simulations. Finally it will consider the application and additional kinds of costs applying Self-Reflection and Active Middleware to sharing information among the organizations expected to participate in Homeland Defense.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Our work on integration of data and knowledge sources is based in a common theoretical treatment of 'Integration Science', which leads to systematic processes for combining formal logical and mathematical systems, computational and physical systems, and human systems and organizations. The theory is based on the processing of explicit meta-knowledge about the roles played by the different knowledge sources and the methods of analysis and semantic implications of the different data values, together with information about the context in which and the purpose for which they are being combined. The research treatment is primarily mathematical, and though this kind of integration mathematics is still under development, there are some applicable common threads that have emerged already. Instead of describing the current state of the mathematical investigations, since they are not yet crystallized enough for formalisms, we describe our applications of the approach in several different areas, including our focus area of 'Constructed Complex Systems', which are complex heterogeneous systems managed or mediated by computing systems. In this context, it is important to remember that all systems are embedded, all systems are autonomous, and that all systems are distributed networks.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Multi-pathogen biosensors that take advantage of sandwich immunoassay detection schemes and utilize conventional fluorescent dye reporter molecules are difficult to make into extremely compact and autonomous packages. The development of a multi-pathogen, immunoassay-based, fiber optic detector that utilizes varying sized fluorescent semiconductor quantum dots (QDs) as the reporter labels has the potential to overcome these problems. In order to develop such a quantum dot-based biosensor, it is essential to demonstrate that QDs can be attached to antibody proteins, such that the specificity of the antibody is maintained. We have been involved in efforts to develop a reproducible method for attaching QDs to antibodies for use in biodetection applications. We have synthesized CdSe/ZnS core-shell QDs of differing size, functionalized their surfaces with several types of organic groups for water solubility, and covalently attached these functionalized QDs to rabbit anti-ovalbumin antibody protein. We also demonstrated that these labeled antibodies exhibit selective binding to ovalbumin antigen. We characterized the QDs at each step in the overall synthesis by UV-VIS absorption spectroscopy and by picosecond (psec) transient photoluminescence (TPL) spectroscopy. TPL spectroscopy measurements indicate that QD lifetime depends on the size of the QD, the intensity of the optical excitation source, and whether or not they are functionalized and conjugated to antibodies. We describe details of these experiments and discuss the impact of our results on our biosensor development program.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The homeland security interests of a many nations are being increasingly threatened by the proliferation of weapons of mass destruction, drug trafficking, mass migration, global terrorism, environmental concerns, international crime and other global issues. This paper presents the case for development of such a transnational ballistic missile defense architecture for homeland defense and specifically addresses the architecture methodology and process, as well as the potential benefits and the top-level architecture trade issues that would have to be addressed if the community should decide to seriously pursue such an approach.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper presents an approach for estimating the launching position of a ballistic trajectory. The estimation is done using trigonometric relations, identifying target's type and averaging to decrease the estimation errors. In addition the paper present the obtained estimation improvement when a measurement of the range to the target is available.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
At the end of a long developmental road, dating back nearly a half-century, we are on the verge of having a defense against ballistic missiles. Starting some fifty years ago, we have initiated, and halted various programs to explore technology for missile defense. The reason for the go and stop program was the theological debate on deterrence. The issue was whether we would deter the Soviets from attacking us if we were to deploy a defense against their ballistic missiles. Our assessment was it would not, because they would expand their offensive. If you watched the President on TV after 9/11, you could sense the depth of his reaction. He is determined that it won't happen again. Furthermore, he must be conscious that this attack was the first time in nearly two centuries when an enemy caused damage in the US. He has created a new national effort to insure that it doesn't happen again. The efforts devoted to this objective are many, complex, and innovative. I will try to cover the most important activities, then describe how they are integrated to reach that objective in dynamic circumstances, of a long war.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Future of Transnational Security: Architectures and Infrastructures
There exists a broad and going range of combinations of sensing technologies, targets, applications and possessors. Threats derived from such combinations are unbounded by the cultural processes and moral expectations of the US or of other companion societies. The need to sense various phenomena in the face of these realities is astoundingly broad and diverse. Fortunately, the potential combinations of sensing technologies, computational power and adaptability of national security officials can be tailored to meet these challenges. Threat possibilities will drive national security community members toward new paradigms.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.