The Center for Security Technologies
Ronald S. IndeckThe Das Family Distinguished Professor
CST Director
Washington University and theCenter for Security Technologies
Washington UniversityUSNWR: highly ranked nationally, top 10 in endowment8 Schools: Medicine, Social Work ranked in the top 3SEAS: 6 departments including ESE and CSE
CSTInterdisciplinary Academic Research CenterFormed early 2002Built on existing strengthsin security research
CST Mission
To advance through research in basic science, mathematics, and engineering those areas which can most directly improve security including:
physical aspects of security (intrusion detection, biological and chemical substance identification) information aspects of security (networking, information awareness, and information theory)law, economics, public policy
CST Scope
An interdisciplinary center40 faculty from five schoolsMore than cybersecurityMore than counterterrorism
A variety of ‘attacks’ including natural disastersIntegrate research through testbeds
Synergy between technology and policyPrivacy/public policy as ‘design criteria’
Scientific and Technological Intellectual Thrusts
Sensors: IndeckAdvanced Electronic Systems: LockwoodInformation-Theoretic Signal and Image Processing: SnyderRecognition Theory and Systems: O’SullivanVision for Security: PlessDistributed and Mobile Systems: GillNetwork and Information Security: HegdeDetection, Isolation, and Accommodation of Faults: IsidoriPrivacy, Public Policy, and Economics: Kieff
Engineering Demonstration Testbeds
Systems IntegrationEnd-to-end Demonstrations
Biometrics/Physics-Based Recognition Systems: MorleySearching Massive Databases for Critical Information: ChamberlainNetworks of Video Cameras: PlessHigh Speed Network Security: LockwoodSecurity of the Food and Water Supply: Smith
Roles of Privacy, Economics, and Policy
Example: Document Authentication
Important documentsAirline tickets, passports, checks, currency, government issued IDs, product labels
Use magnetic signatures to authenticatePhysical phenomena, sensor, signal
How to authenticateAlgorithms, sampling, confidence
Implement the systemElectronics, data management
Exploit Fundamental Science
Using magnetic signatures for:Tamper-evidence for containersPhysical access/bank cardsSoftware protectionDetect manipulation of data. . .
Related Recognition Systems
What to authenticate?Consider biometric:FingerprintingVoice authentication. . .
Recognition systems share commonalitiesFramework, performance analysis
Another Example/Opportunity:Data Explosion
Humanoids have produced 12 Exabytes over the past ~30,000 years (12,000,000,000,000,000,000 Bytes)We will generate next 12 Exabytes in just over a year!US intelligence collects data equaling the printed collection of the US library every day!
Fast, inexpensive searches for changing databases200 times faster than conventional searchesScalable, using conventional drivesSearch need not be exactReduced bus demands
Wide applicabilityIntelligenceImagesGenomics
Intelligent Searching ofMassive Databases
DataSearch Systems, Inc.
Hard drive
Processor
Memory
I/O Bus
Reconfigurable hardware
Memory/processing
Memory Bus
Data Transmission
120 TBytes/sec internet peak rate120 PBytes/month Internet100 PBytes/month telephone
Network Watchman
Electronic postmendirect packets to destination via headers
Secure networkwatch headersview payloadcopy/redirect/stop packets
Digital Array Scanning Interferometer (DASI)
Applications to:Food supply
Transportation
Currency
. . .
Smart Borders – Smart Cameras
Mission Critical Areas
1. Intelligence and warning2. Border and transportation security3. Domestic counterterrorism4. Protecting critical infrastructure5. Defending against catastrophic threats6. Emergency preparedness and response
CST’s Strengths Support the National Security Agenda
Department ofHomeland Security
“The Department will have a clear, efficient organizational structure with four divisions:
1. Border and Transportation Security2. Emergency Preparedness and Response3. Chemical, Biological, Radiological, and Nuclear
Countermeasures4. Information Analysis and Infrastructure
Protection”CST addresses many Science and Technology
issues of the Homeland Security Act
CST Funding/Collaborationsdeveloped and developing
NSF, DoEdARO, DARPA, ONRCIA, FBI, NSANIST – ATPBattelle, SRIBoeing, CSFB, Monsanto, SBC . . . AccessDenied, BECS, Brick, Cernium, Global Velocity, Hackett Security, Mass Sensors, Newberry Group, NVE . . .
CST External Advisory Board
Mr. Earle Harbison (retired President and COO, Monsanto), ChairDr. Massoud Amin (Director of Infrastructure Security, EPRI)Dr. Allen Atkins (VP, Boeing)Dr. Tony Cantu (Chief Scientist, US Secret Service)Prof. Jerry Cox (Senior Professor, Washington University)Col. Tim Daniel (Director, Missouri Office of Homeland Security)Mr. Will Eatherton (Chief Architect, Cisco)Dr. Mark Kryder (CTO, Seagate Technologies)Mr. Jerry McElhatton (President GTO, MasterCard International)Dr. Craig Mundie (CTO, Microsoft)Dr. Sharon Nunes (Director, IBM)Dr. Joe Leonelli (Director, Battelle)Ms. Jan Newton (President TX, SBC)Gen. Tony Robertson, (Fmr. Com. in Chief, Air Mobility Command)Dr. Don Ross (Chairman, Ross and Baruzzini: Cernium)Hon. William Webster (retired Director, CIA and FBI)
CST’s Unique Strengths
Broad Range of Research and ApplicationsSensors through signal processing to implementationsSecurity of food, water, access, network, bordersMore than cybersecurity
Synergy between Technology and PolicySystems Integration
Center for Security Technologies
Established critical mass in security technologiesMany complementary projectsWidespread applicationsFundamental scientific and engineering issuesGuiding standards and impact policyUniquely integrating economic and privacy issuesSynergy between WUSTL, region, and nation
Comprehensive Scientific and Comprehensive Scientific and Engineering ResourceEngineering Resource
Center for Security Technologies
www.cst.wustl.edu
CST Membership Benefits
Access to Laboratories, Professors, and StudentsEarly Access to Intellectual Property and Technology DevelopmentAbility to Conduct/Direct Research On-SiteSynergistic Collaboration with Other Companies on Precompetitive ResearchAccess to Students for Employment
Co-op and Post-Graduate
CST Membership Benefits
Rapid PrototypingAccess Unique, Large Experimental / Computational FacilitiesInput to Technical ReportsAnnual Progress ReportsBiannual Briefings
May and January
Technology Transfer
Wavelet-Based Compression for Fingerprint ID (AFIS)Magnetic Signature DevelopmentAutomatic Target RecognitionHigh Speed Network Content Matching
Ongoing/Developing Research
Intelligent Searching of Massive DatabasesSensor NetworksNetwork and Data SecuritySecure Code DevelopmentSecurity of the Food, Mail, and CurrencyVision for SecurityBiometric-Based AuthenticationPublic Policy
Sensor Networks
Networks of SensorsSensing, communication, control
Intelligently Combine Data from Multiple SensorsPotentially widely distributed
Communication Strategies and ProtocolsCompression, localization, wireless
Control of SensorsAsynchronous communicationSensor parameters
Networks of Distributed Sensors
Existing or Future Sensor NetworksNetworks of Sensors
Waterway: detect pollution, bioterrorism, chemical spillsBuilding: fire, temperature, other agentsCameras: dynamically reconfigureCommunicate problems, identify sourceReal-time response to evolving situations
BECS Engineering
X-ray Scanning and Security Imaging
Conventional Transmission
Scanning at Borders/Airports
Low Energy Backscattered
Behavior Analysis
Network of Video Cameras
Missouri RapidScreenLicense Plate ID System
consider sniper case
Privacy, Public Policy, and Ethics
Societal Issues, Security-Privacy Perception and RealityEconomic Issues, Cost-Benefit Analysis Legal IssuesTechnological Solutions to Privacy IssuesFacilitate Discourse on Technology and Its Implications