Share Email Print

Proceedings Paper

Security systems engineering overview
Author(s): Basil J. Steele
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

Paper Details

Date Published: 29 January 1997
PDF: 4 pages
Proc. SPIE 2934, Security Systems and Nonlethal Technologies for Law Enforcement, (29 January 1997); doi: 10.1117/12.265404
Show Author Affiliations
Basil J. Steele, Sandia National Labs. (United States)

Published in SPIE Proceedings Vol. 2934:
Security Systems and Nonlethal Technologies for Law Enforcement
John B. Alexander; John B. Alexander; Debra D. Spencer; Steve Schmit; Basil J. Steele, Editor(s)

© SPIE. Terms of Use
Back to Top