Paper
18 February 1997 Wireless networks of opportunity in support of secure field operations
Roy H. Stehle, Mark Lewis
Author Affiliations +
Proceedings Volume 2938, Command, Control, Communications, and Intelligence Systems for Law Enforcement; (1997) https://doi.org/10.1117/12.266743
Event: Enabling Technologies for Law Enforcement and Security, 1996, Boston, MA, United States
Abstract
Under funding from the Defense Advanced Research Projects Agency (DARPA) for joint military and law enforcement technologies, demonstrations of secure information transfer in support of law enforcement and military operations other than war, using wireless and wired technology, were held in September 1996 at several locations in the United States. In this paper, the network architecture, protocols, and equipment supporting the demonstration's scenarios are presented, together with initial results, including lessons learned and desired system enhancements. Wireless networks of opportunity encompassed in-building (wireless-LAN), campus-wide (Metricom Inc.), metropolitan (AMPS cellular, CDPD), and national (one- and two-way satellite) systems. Evolving DARPA-sponsored packet radio technology was incorporated. All data was encrypted, using multilevel information system security initiative (MISSI)FORTEZZA technology, for carriage over unsecured and unclassified commercial networks. The identification and authentication process inherent in the security system permitted logging for database accesses and provided an audit trail useful in evidence gathering. Wireless and wireline communications support, to and between modeled crisis management centers, was demonstrated. Mechanisms for the guarded transport of data through the secret-high military tactical Internet were included, to support joint law enforcement and crisis management missions. A secure World Wide Web (WWW) browser forms the primary, user-friendly interface for information retrieval and submission. The WWW pages were structured to be sensitive to the bandwidth, error rate, and cost of the communications medium in use (e.g., the use of and resolution for graphical data). Both still and motion compressed video were demonstrated, along with secure voice transmission from laptop computers in the field. Issues of network bandwidth, airtime costs, and deployment status are discussed.
© (1997) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Roy H. Stehle and Mark Lewis "Wireless networks of opportunity in support of secure field operations", Proc. SPIE 2938, Command, Control, Communications, and Intelligence Systems for Law Enforcement, (18 February 1997); https://doi.org/10.1117/12.266743
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computing systems

Network security

Computer security

Information security

Telecommunications

Defense and security

Internet

RELATED CONTENT

Network systems security analysis
Proceedings of SPIE (May 14 2015)
Considerations and foundations for Botnet simulation
Proceedings of SPIE (April 13 2009)
Intelligent dissemination in a secure, wireless platform
Proceedings of SPIE (April 29 2009)
Using overlays to improve network security
Proceedings of SPIE (July 08 2002)
Internet firewalls: questions and answers
Proceedings of SPIE (March 12 1996)

Back to Top