the center for security technologiesjao/talks/csttalks/ndta.pdf · 2004-06-10 · dr. sharon nunes...
TRANSCRIPT
![Page 1: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/1.jpg)
The Center for Security Technologies
Ronald S. IndeckThe Das Family Distinguished Professor
CST Director
![Page 2: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/2.jpg)
Washington University and theCenter for Security Technologies
Washington UniversityUSNWR: highly ranked nationally, top 10 in endowment8 Schools: Medicine, Social Work ranked in the top 3SEAS: 6 departments including ESE and CSE
CSTInterdisciplinary Academic Research CenterFormed early 2002Built on existing strengthsin security research
![Page 3: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/3.jpg)
CST Mission
To advance through research in basic science, mathematics, and engineering those areas which can most directly improve security including:
physical aspects of security (intrusion detection, biological and chemical substance identification) information aspects of security (networking, information awareness, and information theory)law, economics, public policy
![Page 4: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/4.jpg)
CST Scope
An interdisciplinary center40 faculty from five schoolsMore than cybersecurityMore than counterterrorism
A variety of ‘attacks’ including natural disastersIntegrate research through testbeds
Synergy between technology and policyPrivacy/public policy as ‘design criteria’
![Page 5: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/5.jpg)
Scientific and Technological Intellectual Thrusts
Sensors: IndeckAdvanced Electronic Systems: LockwoodInformation-Theoretic Signal and Image Processing: SnyderRecognition Theory and Systems: O’SullivanVision for Security: PlessDistributed and Mobile Systems: GillNetwork and Information Security: HegdeDetection, Isolation, and Accommodation of Faults: IsidoriPrivacy, Public Policy, and Economics: Kieff
![Page 6: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/6.jpg)
Engineering Demonstration Testbeds
Systems IntegrationEnd-to-end Demonstrations
Biometrics/Physics-Based Recognition Systems: MorleySearching Massive Databases for Critical Information: ChamberlainNetworks of Video Cameras: PlessHigh Speed Network Security: LockwoodSecurity of the Food and Water Supply: Smith
Roles of Privacy, Economics, and Policy
![Page 7: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/7.jpg)
Example: Document Authentication
Important documentsAirline tickets, passports, checks, currency, government issued IDs, product labels
Use magnetic signatures to authenticatePhysical phenomena, sensor, signal
How to authenticateAlgorithms, sampling, confidence
Implement the systemElectronics, data management
![Page 8: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/8.jpg)
Exploit Fundamental Science
Using magnetic signatures for:Tamper-evidence for containersPhysical access/bank cardsSoftware protectionDetect manipulation of data. . .
![Page 9: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/9.jpg)
Related Recognition Systems
What to authenticate?Consider biometric:FingerprintingVoice authentication. . .
Recognition systems share commonalitiesFramework, performance analysis
![Page 10: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/10.jpg)
Another Example/Opportunity:Data Explosion
Humanoids have produced 12 Exabytes over the past ~30,000 years (12,000,000,000,000,000,000 Bytes)We will generate next 12 Exabytes in just over a year!US intelligence collects data equaling the printed collection of the US library every day!
![Page 11: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/11.jpg)
Fast, inexpensive searches for changing databases200 times faster than conventional searchesScalable, using conventional drivesSearch need not be exactReduced bus demands
Wide applicabilityIntelligenceImagesGenomics
Intelligent Searching ofMassive Databases
DataSearch Systems, Inc.
Hard drive
Processor
Memory
I/O Bus
Reconfigurable hardware
Memory/processing
Memory Bus
![Page 12: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/12.jpg)
Data Transmission
120 TBytes/sec internet peak rate120 PBytes/month Internet100 PBytes/month telephone
![Page 13: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/13.jpg)
Network Watchman
Electronic postmendirect packets to destination via headers
Secure networkwatch headersview payloadcopy/redirect/stop packets
![Page 14: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/14.jpg)
Digital Array Scanning Interferometer (DASI)
Applications to:Food supply
Transportation
Currency
. . .
![Page 15: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/15.jpg)
Smart Borders – Smart Cameras
![Page 16: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/16.jpg)
![Page 17: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/17.jpg)
Mission Critical Areas
1. Intelligence and warning2. Border and transportation security3. Domestic counterterrorism4. Protecting critical infrastructure5. Defending against catastrophic threats6. Emergency preparedness and response
CST’s Strengths Support the National Security Agenda
![Page 18: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/18.jpg)
Department ofHomeland Security
“The Department will have a clear, efficient organizational structure with four divisions:
1. Border and Transportation Security2. Emergency Preparedness and Response3. Chemical, Biological, Radiological, and Nuclear
Countermeasures4. Information Analysis and Infrastructure
Protection”CST addresses many Science and Technology
issues of the Homeland Security Act
![Page 19: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/19.jpg)
CST Funding/Collaborationsdeveloped and developing
NSF, DoEdARO, DARPA, ONRCIA, FBI, NSANIST – ATPBattelle, SRIBoeing, CSFB, Monsanto, SBC . . . AccessDenied, BECS, Brick, Cernium, Global Velocity, Hackett Security, Mass Sensors, Newberry Group, NVE . . .
![Page 20: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/20.jpg)
CST External Advisory Board
Mr. Earle Harbison (retired President and COO, Monsanto), ChairDr. Massoud Amin (Director of Infrastructure Security, EPRI)Dr. Allen Atkins (VP, Boeing)Dr. Tony Cantu (Chief Scientist, US Secret Service)Prof. Jerry Cox (Senior Professor, Washington University)Col. Tim Daniel (Director, Missouri Office of Homeland Security)Mr. Will Eatherton (Chief Architect, Cisco)Dr. Mark Kryder (CTO, Seagate Technologies)Mr. Jerry McElhatton (President GTO, MasterCard International)Dr. Craig Mundie (CTO, Microsoft)Dr. Sharon Nunes (Director, IBM)Dr. Joe Leonelli (Director, Battelle)Ms. Jan Newton (President TX, SBC)Gen. Tony Robertson, (Fmr. Com. in Chief, Air Mobility Command)Dr. Don Ross (Chairman, Ross and Baruzzini: Cernium)Hon. William Webster (retired Director, CIA and FBI)
![Page 21: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/21.jpg)
CST’s Unique Strengths
Broad Range of Research and ApplicationsSensors through signal processing to implementationsSecurity of food, water, access, network, bordersMore than cybersecurity
Synergy between Technology and PolicySystems Integration
![Page 22: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/22.jpg)
Center for Security Technologies
Established critical mass in security technologiesMany complementary projectsWidespread applicationsFundamental scientific and engineering issuesGuiding standards and impact policyUniquely integrating economic and privacy issuesSynergy between WUSTL, region, and nation
![Page 23: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/23.jpg)
Comprehensive Scientific and Comprehensive Scientific and Engineering ResourceEngineering Resource
Center for Security Technologies
www.cst.wustl.edu
![Page 24: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/24.jpg)
![Page 25: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/25.jpg)
CST Membership Benefits
Access to Laboratories, Professors, and StudentsEarly Access to Intellectual Property and Technology DevelopmentAbility to Conduct/Direct Research On-SiteSynergistic Collaboration with Other Companies on Precompetitive ResearchAccess to Students for Employment
Co-op and Post-Graduate
![Page 26: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/26.jpg)
CST Membership Benefits
Rapid PrototypingAccess Unique, Large Experimental / Computational FacilitiesInput to Technical ReportsAnnual Progress ReportsBiannual Briefings
May and January
![Page 27: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/27.jpg)
Technology Transfer
Wavelet-Based Compression for Fingerprint ID (AFIS)Magnetic Signature DevelopmentAutomatic Target RecognitionHigh Speed Network Content Matching
![Page 28: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/28.jpg)
Ongoing/Developing Research
Intelligent Searching of Massive DatabasesSensor NetworksNetwork and Data SecuritySecure Code DevelopmentSecurity of the Food, Mail, and CurrencyVision for SecurityBiometric-Based AuthenticationPublic Policy
![Page 29: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/29.jpg)
Sensor Networks
Networks of SensorsSensing, communication, control
Intelligently Combine Data from Multiple SensorsPotentially widely distributed
Communication Strategies and ProtocolsCompression, localization, wireless
Control of SensorsAsynchronous communicationSensor parameters
![Page 30: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/30.jpg)
Networks of Distributed Sensors
Existing or Future Sensor NetworksNetworks of Sensors
Waterway: detect pollution, bioterrorism, chemical spillsBuilding: fire, temperature, other agentsCameras: dynamically reconfigureCommunicate problems, identify sourceReal-time response to evolving situations
BECS Engineering
![Page 31: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/31.jpg)
X-ray Scanning and Security Imaging
Conventional Transmission
![Page 32: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/32.jpg)
Scanning at Borders/Airports
Low Energy Backscattered
Behavior Analysis
![Page 33: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/33.jpg)
Network of Video Cameras
Missouri RapidScreenLicense Plate ID System
consider sniper case
![Page 34: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President](https://reader035.vdocument.in/reader035/viewer/2022070912/5fb436f0ecf9292247640a51/html5/thumbnails/34.jpg)
Privacy, Public Policy, and Ethics
Societal Issues, Security-Privacy Perception and RealityEconomic Issues, Cost-Benefit Analysis Legal IssuesTechnological Solutions to Privacy IssuesFacilitate Discourse on Technology and Its Implications