Proceedings Volume 9456

Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security, Defense, and Law Enforcement XIV

cover
Proceedings Volume 9456

Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security, Defense, and Law Enforcement XIV

Purchase the printed version of this volume at proceedings.com or access the digital version at SPIE Digital Library.

Volume Details

Date Published: 1 June 2015
Contents: 10 Sessions, 35 Papers, 0 Presentations
Conference: SPIE Defense + Security 2015
Volume Number: 9456

Table of Contents

icon_mobile_dropdown

Table of Contents

All links to SPIE Proceedings will open in the SPIE Digital Library. external link icon
View Session icon_mobile_dropdown
  • Front Matter: Volume 9456
  • Chemical, Concealed Weapons, Through-the-Wall Sensor and Material Technologies and Systems
  • Infrastructure Protection and Counter Terrorism I
  • Cyber Crimes, Cyberterrorism, and Law Enforcement
  • C3I Systems and Technologies I
  • C3I Systems and Technologies II
  • Infrastructure Protection and Counter Terrorism II
  • Infrastructure Protection: Undersea and Maritime Technologies and Systems I
  • Infrastructure Protection: Undersea and Maritime Technologies and Systems II
  • Infrastructure Protection: Air Operations
Front Matter: Volume 9456
icon_mobile_dropdown
Front Matter: Volume 9456
This PDF file contains the front matter associated with SPIE Proceedings Volume 9456, including the Title Page, Copyright information, Table of Contents, Invited Panel Discussion, and Conference Committee listing.
Chemical, Concealed Weapons, Through-the-Wall Sensor and Material Technologies and Systems
icon_mobile_dropdown
Demonstration of novel high-power acoustic through-the-wall sensor
A high-power acoustic sensor, capable of detecting and tracking persons through steel walls of cargo containers, trailer truck bodies, and train cars, has been developed and demonstrated. The sensor is based on a new concept for narrowband mechanical-impact acoustic transmitters and matched resonant receivers. The lightweight, compact, and low-cost transmitters produce high-power acoustic pulses at one or more discrete frequencies with little input power. The energy for each pulse is accumulated over long times at low powers, like a mousetrap, and therefore can be operated with ordinary batteries and no power conditioning. A breadboard impact-transmitter and matched-receiver system that detected human motion through thick walls with only rudimentary signal processing is described, and results are presented. A conceptual design is presented of an acoustic through-the-wall sensor, costing about $10,000 per unit and capable of remotely and non-intrusively scanning steel cargo containers for stowaways at a rate of two containers per minute. Advantages of acoustic through-the-wall sensors over radar are: Sound penetrates metal walls; and acoustic sensors are sensitive to small and slow motions, and so can detect stationary persons by breathing motion alone. Other attractive features include: high-resolution locating and tracking; portability; low cost; quick and easy preparation and deployment; and near-real-time data processing and display. These features provide a robust stand-alone through-the-wall surveillance capability or an excellent complement to a radar sensor.
The use of short and wide x-ray pulses for time-of-flight x-ray Compton Scatter Imaging in cargo security
Nick Calvert, Marta M. Betcke, John R. Cresswell, et al.
Using a short pulse width x-ray source and measuring the time-of-flight of photons that scatter from an object under inspection allows for the point of interaction to be determined, and a profile of the object to be sampled along the path of the beam. A three dimensional image can be formed by interrogating the entire object. Using high energy x rays enables the inspection of cargo containers with steel walls, in the search for concealed items. A longer pulse width x-ray source can also be used with deconvolution techniques to determine the points of interaction. We present time-of-flight results from both short (picosecond) width and long (hundreds of nanoseconds) width x-ray sources, and show that the position of scatter can be localised with a resolution of 2 ns, equivalent to 30 cm, for a 3 cm thick plastic test object.
Consideration of the use of visible light 3D scanning for prisoner contraband possession assessment and other similar purposes
Contraband possession assessment of those being involuntarily confined, whether in the context of a civilian criminal detention facility or detention of captured warfighters is inherently problematic. Some individuals may desire to, for a number of purposes, retain objects beyond screening. These objects may range from benign to weapons or other objects that could injure other detainees or which, in the context of warfighters, may be detrimental to security or defense objectives in other ways. This paper describes the prospective use of a visible light scanner for checkpoint assessment purposes. It contrasts the invasiveness of this technology with conventional techniques.
Infrastructure Protection and Counter Terrorism I
icon_mobile_dropdown
Mobile, portable lightweight wireless video recording solutions for homeland security, defense, and law enforcement applications
It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.
A low-cost FMCW radar for footprint detection from a mobile platform
David Boutte, Paul Taylor, Allan Hunt
Footprint and human trail detection in rugged all-weather environments is an important and challenging problem for perimeter security, passive surveillance and reconnaissance. To address this challenge a low-cost, wideband, frequency-modulated continuous wave (FMCW) radar operating at 33.4GHz – 35.5GHz is being developed through a Department of Homeland Security Science and Technology Directorate Phase I SBIR and has been experimentally demonstrated to be capable of detecting footprints and footprint trails on unimproved roads in an experimental setting. It uses a low-cost digital signal processor (DSP) that makes important operating parameters reconfigurable and allows for frequency sweep linearization, a key technique developed to increase footprint signal-to-noise ratio (SNR). This paper discusses the design, DSP implementation and experimental results of a low-cost FMCW radar for mobile footprint detection. A technique for wideband sweep linearization is detailed along with system performance metrics and experimental results showing receive-SNR from footprint trails in sand and on unimproved dirt roads. Results from a second stepped frequency CW (SFCW) Ka-band system are also shown, verifying the ability of both systems to detect footprints and footprint trails in an experimental setting. The results show that there is sufficient receive-SNR to detect even shallow footprints (~1cm) using a radar based detection system in Ka-band. Field experimental results focus on system proof of concept from a static position with mobile results also presented highlighting necessary improvements to both systems.
Optically resonant subwavelength films for tamper-indicating tags and seals
Kyle J. Alvine, Jonathan D. Suter, Bruce E. Bernacki, et al.
We present the design, modeling and performance of a proof-of-concept tamper indicating approach that exploits newlydeveloped subwavelength-patterned films. These films have a nanostructure-dependent resonant optical reflection that is wavelength, angle, and polarization dependent. As such, they can be tailored to fabricate overlay transparent films for tamper indication and authentication of sensitive or controlled materials not possible with currently-known technologies. An additional advantage is that the unique optical signature is dictated by the geometry and fabrication process of the nanostructures in the film, rather than on the material used. The essential structure unit in the subwavelength resonant coating is a nanoscale Open-Ring Resonator (ORR). This building block is fabricated by coating a dielectric nanoscale template with metal to form a hemispherical shell-like structure. This curved metallic shell structure has a cross-section with an intrinsic capacitance and inductance and is thus the optical equivalent to the well-known “LC” circuit where the capacitance and inductance are determined by the nanoshell dimensions. For structures with sub 100 nm scale, this resonance occurs in the visible electromagnetic spectrum, and in the IR for larger shells. Tampering of the film would be visible though misalignment of the angle-sensitive features in the film. It is additionally possible to add in intrinsic oxidation and strain sensitive matrix materials to further complicate tamper repair and counterfeiting. Cursory standoff readout would be relatively simple using a combination of a near-infrared (or visible) LED flashlight and polarizer or passively using room lighting illumination and a dispersive detector.
Multi-capability color night vision HD camera for defense, surveillance, and security
Francis Pang, Gareth Powell, Pierre Fereyre
e2v has developed a family of high performance cameras based on our next generation CMOS imagers that provide multiple features and capabilities to meet the range of challenging imaging applications in defense, surveillance, and security markets.

Two resolution sizes are available: 1920x1080 with 5.3 μm pixels, and an ultra-low light level version at 1280x1024 with 10μm pixels. Each type is available in either monochrome or e2v’s unique bayer pattern color version. The camera is well suited to accommodate many of the high demands for defense, surveillance, and security applications: compact form factor (SWAP+C), color night vision performance (down to 10-2 lux), ruggedized housing, Global Shutter, low read noise (<6e- in Global shutter mode and <2.5e- in Rolling shutter mode), 60 Hz frame rate, high QE especially in the enhanced NIR range (up to 1100nm). Other capabilities include active illumination and range gating.

This paper will describe all the features of the sensor and the camera. It will be followed with a presentation of the latest test data with the current developments. Then, it will conclude with a description of how these features can be easily configured to meet many different applications. With this development, we can tune rather than create a full customization, making it more beneficial for many of our customers and their custom applications.
Performance of a buried microphone to detect voice and footsteps
Majority of the unattended ground sensors (UGS) use both acoustic and seismic sensors to detect various targets, namely, people, vehicles, etc. The UGS once deployed should for several months before changing the batteries. This implies use of fewer sensors may result in longer UGS life. Towards this goal, we are exploring the possibility of buried microphone to perform the task of both seismic and microphone functions. In this paper, we analyze the performance of a buried microphone to detect voice and footsteps.
Surveillance systems for intermodal transportation
Sergej Jakovlev, Miroslav Voznak, Arunas Andziulis
Intermodal container monitoring is considered a major security issue in many major logistic companies and countries worldwide. Current representation of the problem, we face today, originated in 2002, right after the 9/11 attacks. Then, a new worldwide Container Security Initiative (CSI, 2002) was considered that shaped the perception of the transportation operations. Now more than 80 larger ports all over the world contribute to its further development and integration into everyday transportation operations and improve the regulations for the developing regions. Although, these new improvements allow us to feel safer and secure, constant management of transportation operations has become a very difficult problem for conventional data analysis methods and information systems. The paper deals with a proposal of a whole new concept for the improvement of the Containers Security Initiative (CSI) by virtually connecting safety, security processes and systems. A conceptual middleware approach with deployable intelligent agent modules is proposed to be used with possible scenarios and a testbed is used to test the solution. Middleware examples are visually programmed using National Instruments LabView software packages and Wireless sensor network hardware modules. An experimental software is used to evaluate he solution. This research is a contribution to the intermodal transportation and is intended to be used as a means or the development of intelligent transport systems.
Analysis of mutual assured destruction-like scenario with swarms of non-recallable autonomous robots
This paper considers the implications of the creation of an autonomous robotic fighting force without recall-ability which could serve as a deterrent to a ‘total war’ magnitude attack. It discusses the technical considerations for this type of robotic system and the limited enhancements required to current technologies (particularly UAVs) needed to create such a system. Particular consideration is paid to how the introduction of this type of technology by one actor could create a need for reciprocal development. Also considered is the prospective utilization of this type of technology by non-state actors and the impact of this on state actors.
Unmanned Aerial Vehicles (UAVs): a new tool in counterterrorism operations?
Terrorism is not a new phenomenon to the world, yet it remains difficult to define and counter. Countering terrorism requires several measures that must be taken simultaneously; however, counterterrorism strategies of many countries mostly depend on military measures.

In the aftermath of the 2001 terrorist attack on the Twin Towers of the World Trade Center, the United States (U.S.) has started and led the campaign of Global War on Terrorism. They have invaded Afghanistan and Iraq and have encountered insurgencies run by terrorist organizations, such as al-Qaeda and its affiliates. The U.S. made the utilization of Air and Space Power very intensively during these operations. In order to implement operations; Intelligence, Surveillance, and Reconnaissance (ISR) assets were used to collect the necessary information. Before the successful insertion of a small number of U.S. Special Operation Force (SOF) teams into Afghanistan, the U.S. Air Force attacked al-Qaeda and Taliban’s targets such as infrastructure, airfields, ground forces, command-control facilities etc. As soon as the U.S. troops got on the ground and started to marshal to Kabul, the Air Force supported them by attacking jointly determined targets. The Air Force continued to carry out the missions and played a significant role to achieve the objective of operation during all the time.

This is not the only example of utilization of Air and Space Power in counterterrorism and counterinsurgency operations. All around the world, many countries have also made the utilization of Air Power in different missions ranging from ISR to attacking. Thinking that terrorism has a psychological dimension and losing a pilot during operations may result in decreasing the population support to operations, Unmanned Aerial Vehicles (UAVs) started to be used by practitioners and took priority over other assets. Although UAVs have been on the theatre for a long time used for ISR mission in conventional conflicts, with the advent of drones, UAVs have also started to be used for attack missions in counterterrorism operations.

In this study, it is aimed to determine whether UAVs are appropriate assets that can be used in counterterrorism operations. The study starts by examining the term terrorism and counterterrorism and discusses the role of the Air and Space Power in counterterrorism operations. After proposing that UAVs are appropriate assets for counterterrorism operations, it continues by explaining types and common usage concepts of UAVs. The advantages and disadvantages of UAVs are put forward from the counterterrorism operations’ perspectives. It finally examines the utilization of UAVs in counterterrorism operations. In this context, as much as obtained from open sources, countries’ roadmaps, usage concepts, experience, and current structure are examined to determine whether UAVs are appropriate assets in counterterrorism operations. When the advantages of UAVs and the disadvantages of manned systems are analyzed, other findings of our survey will show us that UAVs will be increasingly used in counterterrorism operations
Packet based serial link realized in FPGA dedicated for high resolution infrared image transmission
Grzegorz Bieszczad
In article the external digital interface specially designed for thermographic camera built in Military University of Technology is described. The aim of article is to illustrate challenges encountered during design process of thermal vision camera especially related to infrared data processing and transmission. Article explains main requirements for interface to transfer Infra-Red or Video digital data and describes the solution which we elaborated based on Low Voltage Differential Signaling (LVDS) physical layer and signaling scheme.

Elaborated link for image transmission is built using FPGA integrated circuit with built-in high speed serial transceivers achieving up to 2500Gbps throughput. Image transmission is realized using proprietary packet protocol. Transmission protocol engine was described in VHDL language and tested in FPGA hardware. The link is able to transmit 1280x1024@60Hz 24bit video data using one signal pair. Link was tested to transmit thermal-vision camera picture to remote monitor. Construction of dedicated video link allows to reduce power consumption compared to solutions with ASIC based encoders and decoders realizing video links like DVI or packed based Display Port, with simultaneous reduction of wires needed to establish link to one pair.

Article describes functions of modules integrated in FPGA design realizing several functions like: synchronization to video source, video stream packeting, interfacing transceiver module and dynamic clock generation for video standard conversion.
Cyber Crimes, Cyberterrorism, and Law Enforcement
icon_mobile_dropdown
Quantification of moving target cyber defenses
Katheryn A. Farris, George Cybenko
Current network and information systems are static, making it simple for attackers to maintain an advantage. Adaptive defenses, such as Moving Target Defenses (MTD) have been developed as potential “game-changers” in an effort to increase the attacker’s workload. With many new methods being developed, it is difficult to accurately quantify and compare their overall costs and effectiveness. This paper compares the tradeoffs between current approaches to the quantification of MTDs. We present results from an expert opinion survey on quantifying the overall effectiveness, upfront and operating costs of a select set of MTD techniques. We find that gathering informed scientific opinions can be advantageous for evaluating such new technologies as it offers a more comprehensive assessment. We end by presenting a coarse ordering of a set of MTD techniques from most to least dominant. We found that seven out of 23 methods rank as the more dominant techniques. Five of which are techniques of either address space layout randomization or instruction set randomization. The remaining two techniques are applicable to software and computer platforms. Among the techniques that performed the worst are those primarily aimed at network randomization.
Image encryption by redirection and cyclical shift
In this paper, we present a novel method for encrypting and decrypting large amounts of data such as two-dimensional (2-D) images, both gray-scale and color, without the loss of information, and using private keys of varying lengths. The proposed method is based on the concept of the tensor representation of an image and splitting the 2-D discrete Fourier transform (DFT) by one-dimensional (1-D) DFTs of signals from the tensor representation, or transform. The splitting of the transform is accomplished in a three-dimensional (3-D) space, namely on the 3-D lattice placed on the torus. Each splitting-signal of the image defines the 2-D DFT along the frequency-points located on the spirals on the torus. Spirals have different form and cover the lattice on the torus in a complex form, which makes them very effective when moving data through and between the spirals, and data along the spirals. The encryption consists of several iterative applications of mapping the 3-D torus into several ones of smaller sizes, and rotates then moves the data around the spirals on all tori. The encryption results in the image which is uncorrelated. The decryption algorithm uses the encrypted data, and processes them in inverse order with an identical number of iterations. The proposed method can be extended to encrypt and decrypt documents as well as other types of digital media. Simulation results of the purposed method are presented to show the performance for image encryption.
An exact computational method for performance analysis of sequential test algorithms for detecting network intrusions
Xinjia Chen, Fred Lacy, Patrick Carriere
Sequential test algorithms are playing increasingly important roles for quick detecting network intrusions such as portscanners. In view of the fact that such algorithms are usually analyzed based on intuitive approximation or asymptotic analysis, we develop an exact computational method for the performance analysis of such algorithms. Our method can be used to calculate the probability of false alarm and average detection time up to arbitrarily pre-specified accuracy.
C3I Systems and Technologies I
icon_mobile_dropdown
Bayesian truthing as experimental verification of C4ISR sensors
Tomasz Jannson, Thomas Forrester, Volodymyr Romanov, et al.
In this paper, the general methodology for experimental verification/validation of C4ISR and other sensors’ performance, is presented, based on Bayesian inference, in general, and binary sensors, in particular. This methodology, called Bayesian Truthing, defines Performance Metrics for binary sensors in: physics, optics, electronics, medicine, law enforcement, C3ISR, QC, ATR (Automatic Target Recognition), terrorism related events, and many others. For Bayesian Truthing, the sensing medium itself is not what is truly important; it is how the decision process is affected.
Stochastic optimization of space-time constellations
Xinjia Chen, Patrick Carriere, Fred Lacy
For wireless data communication systems employing multiple antennas, space-time codes play crucial roles for fast transmission of data with accuracy and bandwidth efficiency. Motivated by the large size of constellations of space-time codes and the resultant computational complexity, we develop a stochastic approach for the optimization of space-time constellations. We use union bounds of block error rate as performance measures of the space-time codes. To overcome the computational complexity, we propose to transform the performance measure into the mean of a bounded random variable and establish a statistical method for the estimation of such mean and its gradients with respect to parameters. A stochastic gradient descent method is developed for optimizing space-time codes. Such stochastic techniques are applied to obtain high performance space-time codes of large constellation sizes.
Improving situation awareness with the Android Team Awareness Kit (ATAK)
Kyle Usbeck, Matthew Gillen, Joseph Loyall, et al.
To make appropriate, timely decisions in the field, Situational Awareness (SA) needs to be conveyed in a decentralized manner to the users at the edge of the network as well as at operations centers. Sharing real-time SA efficiently between command centers and operational troops poses many challenges, including handling heterogeneous and dynamic networks, resource constraints, and varying needs for the collection, dissemination, and display of information, as well as recording that information.

A mapping application that allows teams to share relevant geospatial information efficiently and to communicate effectively with one another and command centers has wide applicability to many vertical markets across the Department of Defense, as well as a wide variety of federal, state local, and non-profit agencies that need to share locations, text, photos, and video.

This paper describes the Android Team Awareness Kit (ATAK), an advanced, distributed tool for commercial- off-the-shelf (COTS) mobile devices such as smartphones and tablets. ATAK provides a variety of useful SA functions for soldiers, law enforcement, homeland defense, and civilian collaborative use; including mapping and navigation, range and bearing, text chat, force tracking, geospatial markup tools, image and file sharing, video playback, site surveys, and many others. This paper describes ATAK, the SA tools that ATAK has built-in, and the ways it is being used by a variety of military, homeland security, and law enforcement users.
Adaptive randomized algorithms for analysis and design of control systems under uncertain environments
We consider the general problem of analysis and design of control systems in the presence of uncertainties. We treat uncertainties that affect a control system as random variables. The performance of the system is measured by the expectation of some derived random variables, which are typically bounded. We develop adaptive sequential randomized algorithms for estimating and optimizing the expectation of such bounded random variables with guaranteed accuracy and confidence level. These algorithms can be applied to overcome the conservatism and computational complexity in the analysis and design of controllers to be used in uncertain environments. We develop methods for investigating the optimality and computational complexity of such algorithms.
C3I Systems and Technologies II
icon_mobile_dropdown
Vulnerabilities in GSM technology and feasibility of selected attacks
M. Voznak, M. Prokes, L. Sevcik, et al.
Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem’s occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting – Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.
Anomalies, singularities, and catastrophes in C3ISR systems
Tomasz Jannson, Pedram Boghrat, Thomas Forrester, et al.
In this paper, we provide topological visualization of Digital Decision Support (DDS) tools, both linear and non-linear, the latter ones related to bifurcations and/or catastrophes, including such non-linear phenomena as hysteresis, or sudden jump/drop of state variable (amplitude). As a principal example, we discuss non-linear oscillator catastrophes with applications in: physics, optics, electronics, mechanics, decision process, and others.
The next generation of command post computing
Ross D. Arnold, Aaron J. Lieb, Jason M. Samuel, et al.
The future of command post computing demands an innovative new solution to address a variety of challenging operational needs. The Command Post of the Future is the Army’s primary command and control decision support system, providing situational awareness and collaborative tools for tactical decision making, planning, and execution management from Corps to Company level. However, as the U.S. Army moves towards a lightweight, fully networked battalion, disconnected operations, thin client architecture and mobile computing become increasingly essential. The Command Post of the Future is not designed to support these challenges in the coming decade. Therefore, research into a hybrid blend of technologies is in progress to address these issues. This research focuses on a new command and control system utilizing the rich collaboration framework afforded by Command Post of the Future coupled with a new user interface consisting of a variety of innovative workspace designs. This new system is called Tactical Applications. This paper details a brief history of command post computing, presents the challenges facing the modern Army, and explores the concepts under consideration for Tactical Applications that meet these challenges in a variety of innovative ways.
DXBC: a long distance wireless broadband communication system for coastal maritime surveillance applications
George E. Vastianos, Nick D. Argyreas, Chris K. Xilouris, et al.
The field of Homeland Security focuses on the air, land, and sea borders surveillance in order to prevent illegal activities while facilitating lawful travel and trade. The achievement of this goal requires collaboration of complex decentralized systems and services, and transfer of huge amount of information between the remote surveillance areas and the command & control centers. It becomes obvious that the effectiveness of the provided security depends highly on the available communication capabilities between the interconnected areas. Although nowadays the broadband communication between remote places is presumed easy because of the extensive infrastructure inside residential areas, it becomes a real challenge when the required information should be acquired from locations where no infrastructure is available such as mountain or sea areas. The Integrated Systems Lab of NCSR Demokritos within the PERSEUS FP7- SEC-2011-261748 project has developed a wireless broadband telecommunication system that combines different communication channels from subGHz to microwave frequencies and provides secure IP connectivity between sea surveillance vessels and the Command and Control Centers (C3). The system was deployed in Fast Patrol Boats of the Hellenic Coast Guard that are used for maritime surveillance in sea boarders and tested successfully in two demonstration exercises for irregular migration and smuggling scenarios in the Aegean Archipelagos. This paper describes in detail the system architecture in terms of hardware and software and the evaluation measurements of the system communication capabilities.
Infrastructure Protection and Counter Terrorism II
icon_mobile_dropdown
Remote ballistic emplacement of an electro-optical and acoustic target detection and localization system
Aaron West, Mark Mellini
Near real time situational awareness in uncontrolled non line of sight (NLOS) and beyond line of sight (BLOS) environments is critical in the asymmetric battlefield of future conflicts. The ability to detect and accurately locate hostile forces in difficult terrain or urban environments can dramatically increase the survivability and effectiveness of dismounted soldiers, especially when they are limited to the resources available only to the small unit.

The Sensor Mortar Network (SMortarNet) is a 60mm Intelligence, Surveillance, and Reconnaissance (ISR) mortar designed to give the Squad near real time situational awareness in uncontrolled NLOS environments. SMortarNet is designed to track targets both acoustically and electro optically and can fuse tracks between, the acoustic, EO, and magnetic modalities on board. The system is linked to other mortar nodes and the user via a masterless frequency hopping spread spectrum ad-hoc mesh radio network.

This paper will discuss SMortarNet in the context of a squad level dismounted soldier, its technical capabilities, and its benefit to the small unit Warfighter. The challenges with ballistic remote emplacement of sensitive components and the on board signal processing capabilities of the system will also be covered. The paper will also address how the sensor network can be integrated with existing soldier infrastructure, such as the NettWarrior platform, for rapid transition to soldier systems.

Networks of low power sensors can have many forms, but the more practical networks for warfighters are ad hoc radio-based systems that can be rapidly deployed and can leverage a range of assets available at a given time. The low power long life networks typically have limited bandwidth and may have unreliable communication depending on the network health, which makes autonomous sensors a critical component of the network. SMortarNet reduces data to key information features at the sensor itself. The smart sensing approach enables significant data reduction before transmission, to facilitate sharing data among sensors in challenging environments, without requiring high bandwidth communication channels. When required by the user, SMortarNet can transmit full frame images and streaming audio by using the full network bandwidth.
Infrastructure Protection: Undersea and Maritime Technologies and Systems I
icon_mobile_dropdown
Laser beam propagation through an atmospheric transitional and turbulent boundary layer
Richard A. Katz, Tariq Manzur
This study investigates laser beam propagation through an atmospheric boundary layer near the ocean surface. Objectives of this research are to ascertain feasibility limits for achieving maximum energy efficiency at extended ranges in the face of atmospheric and other distortions as the laser beam penetrates through transitional (anisotropic) and turbulent (isotropic) boundary layer regimes. Various aspects of turbulence modeling of laser beam propagation near the ocean surface are discussed including: Kolmogorov's model of atmospheric turbulence, parameterized structure functions (e.g., velocity and temperature gradients, gradients in refractive index) and other important factors affecting near surface propagation such as humidity, aerosols, and wave slap. Various preliminary modeled propagation results are shown, and a new methodology is proposed for improving existing model estimates with new time domain measurement procedures.
Challenges of laser beam propagation near/within marine boundary layer
Tariq Manzur, Richard A. Katz, Joshua Olson
Marine atmospheric condition plays a critical role on imaging, laser beam propagation, and optical communication of the commercial and military platform. In Military platforms, ships and sailors must be able to defend and communicate with other maritime platform in sometimes volatile and hostile regions around the globe. Naval combatants need defensive and offensive capabilities against a variety of potential threats – many coming at low altitude, UAV, USV etc. High energy lasers (HELs) are currently in development, which have sufficient power levels (~100 kW) to destroy/disable most types of threats. Though target engagement and energy delivery are challenging, a HEL weapon can engage targets at the speed of light, does not require physical ammunition, and is able to run for hours at a time.
Infrastructure Protection: Undersea and Maritime Technologies and Systems II
icon_mobile_dropdown
Various uses for optical metamaterials
Optical metamaterials promise aberration free and better than diffraction limited performance for imaging systems through constructed materials made to regulate the interaction with electromagnetic waves. Optical metamaterials have the potential to miniaturize the optical bench and obtain diffraction-limited performance with a single device. The reduction of size, weight, and complexity of optical systems while maintaining performance is desired. In unmanned aircrafts, buoy systems, 360 degree imaging systems, and optronic or traditional periscope systems the lenses constitute a considerable percentage of the weight and volume. Another characteristic that is desired is optical cross section reduction for both visible and infrared bands. Optical cloaking using metamaterials has the potential to make objects indiscernible from its environment by masking objects signature. Other characteristics that are desired are materials that are perfect light absorbers for stray light baffles, detectors, or solar energy harvesting, nonlinear frequency conversion for photonics devices, and lenses or head window coatings to achieve specific properties. These topics are discussed in this paper.
Characterization of nonlinear systems with memory: combatting the curse of dimensionality
A. H. Nuttall, R. A. Katz, D. R. Hughes, et al.
This study investigates laser beam propagation through an atmospheric boundary layer near the ocean surface. Objectives of this research are to ascertain feasibility limits for achieving maximum energy efficiency at extended ranges in the face of atmospheric and other distortions as the laser beam penetrates through transitional (anisotropic) and turbulent (isotropic) boundary layer regimes. Various aspects of turbulence modeling of laser beam propagation near the ocean surface are discussed including: Kolmogorov’s model of atmospheric turbulence, parameterized structure functions (e.g., velocity and temperature gradients, gradients in refractive index) and other important factors affecting near surface propagation such as humidity, aerosols, and wave slap. Various preliminary modeled propagation results are shown, and a new methodology is proposed for improving existing model estimates with new time domain measurement procedures.
Navigation lights color study
Jose G. Barbosa, Matthew T. Alberg
The chromaticity of navigation lights are defined by areas on the International Commission on Illumination (CIE) 1931 chromaticity diagram. The corner coordinates for these areas are specified in the International Regulations for Prevention of Collisions at Sea, 1972 (72 COLREGS). The navigation light’s color of white, red, green, and yellow are bounded by these areas. The chromaticity values specified by the COLREGS for navigation lights were intended for the human visual system (HVS). The HVS can determine the colors of these lights easily under various conditions. For digital color camera imaging systems the colors of these lights are dependent on the camera’s color spectral sensitivity, settings, and color correction. At night the color of these lights are used to quickly determine the relative course of vessels. If these lights are incorrectly identified or there is a delay in identifying them this could be a potential safety of ship concern. Vessels that use camera imaging systems exclusively for sight, at night, need to detect, identify, and discriminate navigation lights for navigation and collision avoidance. The introduction of light emitting diode (LED) lights and lights with different spectral signatures have the potential to be imaged very differently with an RGB color filter array (CFA) color camera than with the human eye. It has been found that some green navigation lights’ images appear blue verse green. This has an impact on vessels that use camera imaging systems exclusively for navigation. This paper will characterize color cameras ability to properly reproducing navigation lights’ color and survey a set of navigation light to determine if they conform to the COLREGS.
Image processing in a maritime environment
Kenneth A. Pietrzak, Matthew T. Alberg
The performance of mast mounted imaging sensors operating near the near marine boundary layer can be severely impacted by environmental issues. Haze, atmospheric turbulence, and rough seas can all impact imaging system performance. Examples of these impacts are provided in this paper. In addition, sensor artifacts such as deinterlace artifacts can also impact imaging performance. Deinterlace artifacts caused by a rotating mast are often too severe to be useful by an operator for detection of contacts. An artifact edge minimization approach is presented that eliminates these global motion-based deinterlace artifacts.
Sea-air boundary meteorological sensor
The atmospheric environment can significantly affect radio frequency and optical propagation. In the RF spectrum refraction and ducting can degrade or enhance communications and radar coverage. Platforms in or beneath refractive boundaries can exploit the benefits or suffer the effects of the atmospheric boundary layers. Evaporative ducts and surface-base ducts are of most concern for ocean surface platforms and evaporative ducts are almost always present along the sea-air interface. The atmospheric environment also degrades electro-optical systems resolution and visibility. The atmospheric environment has been proven not to be uniform and under heterogeneous conditions substantial propagation errors may be present for large distances from homogeneous models. An accurate and portable atmospheric sensor to profile the vertical index of refraction is needed for mission planning, post analysis, and in-situ performance assessment. The meteorological instrument used in conjunction with a radio frequency and electro-optical propagation prediction tactical decision aid tool would give military platforms, in real time, the ability to make assessments on communication systems propagation ranges, radar detection and vulnerability ranges, satellite communications vulnerability, laser range finder performance, and imaging system performance predictions. Raman lidar has been shown to be capable of measuring the required atmospheric parameters needed to profile the atmospheric environment. The atmospheric profile could then be used as input to a tactical decision aid tool to make propagation predictions.
Transition from intelligence cycle to intelligence process: the network-centric intelligence in narrow seas
Engin Büker
The defence technologies which have been developing and changing rapidly, today make it difficult to be able to foresee the next environment and spectrum of warfare. When said change and development is looked in specific to the naval operations, it can be said that the possible battlefield and scenarios to be developed in the near and middle terms (5–20 years) are more clarified with compare to other force components. Network Centric Naval Warfare Concept that was developed for the floating, diving and flying fleet platforms which serves away from its own mainland for miles, will keep its significance in the future. Accordingly, Network Centric Intelligence structure completely integrating with the command and control systems will have relatively more importance.

This study will firstly try to figure out the transition from the traditional intelligence cycle that is still used in conventional war to Network Centric Intelligence Production Process. In the last part, the use of this new approach on the base of UAV that is alternative to satellite based command control and data transfer systems in the joint operations in narrow seas will be examined, a model suggestion for the use of operative and strategic UAVs which are assured within the scope of the NATO AGS2 for this aim will be brought.
Infrastructure Protection: Air Operations
icon_mobile_dropdown
Deterrence of ballistic missile systems and their effects on today's air operations
Lately, the effect-based approach has gained importance in executing air operations. Thus, it makes more successful in obtaining the desired results by breaking the enemy’s determination in a short time. Air force is the first option to be chosen in order to defuse the strategic targets. However, the problems such as the defense of targets and country, radars, range…etc. becoming serious problems. At this level ballistic missiles emerge as a strategic weapon. Ultimate emerging technologies guided by the INS and GPS can also be embedded with multiple warheads and reinforced with conventional explosive, ballistic missiles are weapons that can destroy targets with precision. They have the advantage of high speed, being easily launched from every platform and not being easily detected by air defense systems contrary to other air platforms. While these are the advantages, there are also disadvantages of the ballistic missiles. The high cost, unavailability of nuclear, biological and chemical weapons, and its limited effect while using conventional explosives against destroying the fortified targets are the disadvantages. The features mentioned above should be considered as limitation to the impact of the ballistic missiles. The aim is to impose the requests on enemies without starting a war with all components and to ensure better implementation of the operation functions during the air operations. In this study, effects of ballistic missiles in the future on air battle theatre will be discussed in the beginning, during the process and at the end phase of air operations within the scope of an effect-based approach.
Future's operation areas: new-generation suppression enemy air defence (SEAD) elements
Since air vehicles took place in the theater of operations, they have become the indispensable elements and the strongest attack power of armed forces. In the following period, with technological development, supersonic aircrafts took place in the operation area and this increased effectiveness of air vehicles much more. Air forces have used these aircrafts during important missions like strategic attack and air defense operations.

On the other hand, decision makers understood that it was not feasible to intercept fighter aircrafts by executing combat air patrol flight missions. Since there is not enough reaction time to intercept the high speed aircrafts, ground stationed Surface to Air Missiles (SAM) system requirement has emerged. Therefore, SAM systems took place in the operation scene as well.

Due to the fact that SAM systems emerged against the attack power, the attack aircrafts are to keep away from the fire of the ground stationed SAM systems. Hence, the requirement of Suppression Enemy Air Defense (SEAD) arose. SEAD elements take under suppression the radar of the SAM systems. In this way, attack aircrafts are able to attack without the risk of SAM systems.

The purpose of this study is to find new methods or concepts in order to protect friendly attack aircrafts against ground based surface to air missiles’ fires.

Modernization of SAM systems and new generation SAM system producing activities have proceeded with positive acceleration. So, current SEAD elements and concepts are not able to cover the requirements due to the increased SAM system ranges. According to the concepts, SEAD weapons‘ ranges must be longer than the SAM weapons’ ranges to protect friendly aircrafts.

In this study, new concept was offered to overcome the deficiencies of current SEAD concept. The elements of new concepts were put forward. Classic SEAD concept and new generation concepts were assessed by using SWOT analysis technique.

As a result, this study has revealed that, air forces’ effectiveness can be enhanced by using new generation SEAD concepts against enemy SAM systems.