U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

CARNAHAN CONFERENCE ON CRIME COUNTERMEASURES PROCEEDINGS, MAY 16-18, 1979

NCJ Number
62284
Editor(s)
J S JACKSON
Date Published
1979
Length
189 pages
Annotation
SESSIONS OF THIS 1979 CONFERENCE ON CRIME CONTROL MEASURES FOCUSED ON SECURITY, COMMUNICATIONS TECHNIQUES, IDENTIFICATIONS AND AUTHENTICATION, CRISIS MANAGEMENT, VEHICLE MONITORING, AND EVALUATION.
Abstract
THE OPENING SESSION OF THE CARNAHAN CONFERENCE CONSIDERED COOPERATIVE RESEARCH AND DEVELOPMENT FOR POLICE IN THE UNITED KINGDOM, DEVELOPMENTS MADE BY THE U.S. AIR FORCE RELATED TO EXTERNAL PHYSICAL SECURITY SYSTEMS FOR THE U.S. DEPARTMENT OF DEFENSE, ACCESS CONTROL, AND SECURITY PRACTICES FOR SMALL BUSINESS RETAILERS. SESSION TWO EXAMINED COMMUNICATIONS AND CONTROL, SPECIFICALLY THE DEVELOPMENT OF AN INTEGRATED STATEWIDE LAW ENFORCEMENT COMMUNICATIONS SYSTEM, MOBILE DATA TRANSMISSION AND A FACSIMILE SYSTEM, AND ELECTRONIC COMMAND AND CONTROL AIDS. ANOTHER DEALT WITH PERSON IDENTIFICATION AND AUTHENTICATION AND EXPLORED SUCH AREAS AS AUTOMATIC FORENSIC SPEAKER RECOGNITION, VOICE AUTHENTICATION, MICROWAVE RESPIRATION MONITORING, AUTOMATIC WRITER RECOGNITION, AND AUTOMATIC ENTRY CONTROL FOR MILITARY APPLICATIONS. A SESSION CONCERNED WITH IDENTIFICATION AND EVALUATION ADDRESSED PERSONNEL AUTHENTICATION USING LONG-TERM AVERAGED VOICE SPECTRA, COUMPUTER-ASSISTED TEXT ANALYSIS, ACHIEVING AND MEASURING HIGH SECURITY IN ANALOG SPEECH COMMUNICATIONS SECURITY DEVICES, AND A A SIGNAL THEORETICAL METHOD FOR CREATING FORGERY-PROOF DOCUMENTS FOR AUTOMATIC VERIFICATION. IN SESSION FIVE CRISIS MANAGEMENT, X-RAY TECHNOLOGY AND AVAILABLE SYSTEMS FOR PARCEL INSPECTION WERE ALSO DISCUSSED, AS WAS COMPUTER MAP GENERATION IN AN AUTOMATIC VEHICLE MONITORING SYSTEM. THE FINAL SESSION DEALT WITH A MICROCOMPUTER VIDEO MOTION DETECTION SYSTEM, RESOURCE PROTECTION BY SEGMENTED LEAKY COAXIAL CABLES, THE DESIGN OF VIDEO STORAGE FOR SECURITY SURVEILLANCE SYSTEMS, COMPUTER SECURITY SIMULATION, AND REAL-TIME SURVEILLANCE OF WIDELY SEPARATED REMOTE SITES. PAPERS PUBLISHED BUT NOT PRESENTED AT THE CONFERENCE EXAMINED DATA COMPRESSION IN CRYPTOGRAPHY, SPEAKER RECOGNITION IN CHORAL SPEECH, IMAGING SURVEILLANCE SYSTEMS, AND CATASTROPHE THEORY AND CERTAIN DESIGN ASPECTS OF AUTOMATED IDENTIFICATION SYSTEMS. TABLES, FIGURES, REFERENCES, AND STATISTICAL PROCEDURES AND EQUATIONS ARE INCLUDED. (DEP)