32 research outputs found

    Citizen participation in crime prevention : the case of residential patrols and guards

    Get PDF
    Thesis. 1976. M.C.P.--Massachusetts Institute of Technology. Dept. of Urban Studies and Planning.Microfiche copy available in Archives and Rotch.Bibliography: leaves 129-133.by Toby G. Radasky.M.C.P

    Florida Energy Assurance Plan

    Get PDF
    This spring, Florida held the nations first statewide emergency preparedness training and exercises geared specifically to the aftermath of severe geomagnetic events. Funded by the State of Florida Division of Emergency Management (FDEM) via a Department of Energy grant and held in collaboration with Watch House International, Inquesta Corporation, and the Florida Institute of Technology, the 17-19 April 2012 workshop had 99 on-site attendees in an oceanfront hotel in Melbourne, Florida, as well as 16 over live Web streaming. The workshop was the capstone to a three-month season of 21 regional space weather training sessions and workshops serving 386 attendees in total

    Florida Energy Assurance Plan

    Get PDF
    This spring, Florida held the nation’s first statewide emergency preparedness training and exercises geared specifically to the aftermath of severe geomagnetic events. Funded by the State of Florida Division of Emergency Management (FDEM) via a Department of Energy grant and held in collaboration with Watch House International, Inquesta Corporation, and the Florida Institute of Technology, the 17–19 April 2012 workshop had 99 on-site attendees in an oceanfront hotel in Melbourne, Florida, as well as 16 over live Web streaming. The workshop was the capstone to a three-month season of 21 regional space weather training sessions and workshops serving 386 attendees in total. Participants included emergency managers, law enforcement officers, emergency medicine practitioners, and private industry stakeholders, including representatives from utility and telecommunications companies. The three-day statewide workshop began with one day of education and targeted training, featuring space weather experts in government, academia, and private companies, as well as the regional utility grid reliability organization. The following two days were devoted to a tabletop exercise where participants, divided into groups by area of responsibility, worked through an evolving scenario of space weather–related events, running through their preparedness plans and examining responses

    Understanding GIC in the UK and French high-voltage transmission systems during severe magnetic storms

    Get PDF
    The measurement and collection of digital magnetic field data in Europe extends back to the 1970s, providing over 30 years of data for the analysis of severe space weather. Although paper records can potentially extend these data sets back by over a century, few digitized records are currently available for use in extreme studies. Therefore, we rely on theoretical arguments and modeling to elucidate the largest likely variations of the magnetic field. We assess the relationship, during the three largest storms in the digital era, between variations in the horizontal magnetic field and the largest measured Dst index to estimate likely magnetic variations for more extreme storms in northern and midlatitude Europe. We examine how geomagnetically induced currents (GIC) flow in the UK and French networks during recent severe storms and analyze the sensitivity of these flows to changes in grid parameters. The maximum GIC computed at any one node in the French and UK grids are 44 A and 208 A, respectively. Sensitivity tests show that while gross changes of the whole network structure, such as disconnecting parts of the network, reduces the mean GIC per node, changes in GIC at individual nodes have distinct behaviors implying that local effects are network dependent and require detailed modeling to sufficiently characterize GIC. In addition, the scale factors we have derived allow GIC results from recent storms to be upscaled to estimate the potential risk to the system from more extreme events, such as the Carrington storm in 1859

    Introduction to EM Information Security for IoT devices

    No full text
    © 2018 IEEE. With the advent of the Internet of Things (IoT), many electronic devices (e.g., smart meters, surveillance cameras, mobile devices, and multiple sensors) are interconnected. Each device gathers data and uploads it to servers via communication networks. Servers store the large volumes of received data in databases. Applications analyze this data and extract valuable information. Finally, based on this information, new services (in domains such as smart cities, public safety, e-commerce, medical, healthcare, or automobile) are provided. In this data flow, systems and applications in the upper layer trust the hardware in the lower layer, which includes data-gathering devices. If the collected information is intentionally modified by adversaries, services in the upper layer could be disrupted. Therefore, to ensure service continuity in the IoT, it is important to secure the hardware layer in which data are harvested and transmitted. In this paper, we focus on hardware-level security in IoT systems and classify the schemes proposed for physical security of IoT into three categories. We also provide examples for each of these and explain threats and countermeasures.status: publishe

    Introduction to EM Information Security for IoT devices

    Get PDF
    © 2018 IEEE. With the advent of the Internet of Things (IoT), many electronic devices (e.g., smart meters, surveillance cameras, mobile devices, and multiple sensors) are interconnected. Each device gathers data and uploads it to servers via communication networks. Servers store the large volumes of received data in databases. Applications analyze this data and extract valuable information. Finally, based on this information, new services (in domains such as smart cities, public safety, e-commerce, medical, healthcare, or automobile) are provided. In this data flow, systems and applications in the upper layer trust the hardware in the lower layer, which includes data-gathering devices. If the collected information is intentionally modified by adversaries, services in the upper layer could be disrupted. Therefore, to ensure service continuity in the IoT, it is important to secure the hardware layer in which data are harvested and transmitted. In this paper, we focus on hardware-level security in IoT systems and classify the schemes proposed for physical security of IoT into three categories. We also provide examples for each of these and explain threats and countermeasures.status: publishe

    High Dynamic Range, Wide Bandwidth Electromagnetic Field Threat Detector

    No full text

    Modeling of an EMP conducted environment

    No full text
    The International Electrotechnical Commission (IEC) decided in 1988 to produce a civil standard on the electromagnetic effects of a high altitude EMP (HEMP). Different documents pertaining to the radiated environment and to specifications and test methods have been elaborated and are circulated. A standard conducted environment dependent on many parameters is, however, more difficult to define. The authors present a probabilistic approach which has been adopted to define a typical current shape for the conducted environment. The distribution functions of the peak current value for horizontal and vertical polarizations based on 1710 calculated cases reflecting a variation of the elevation and azimuthal angles from 0 to 90° are presented and discusse
    corecore