Upload
sandeep-kumar
View
87
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Rapidsoft Systems (http:///www.rapidsoftsystems.com) is a leading outsourced software development, and IT service company based in NJ with offices in the US, India and Middle East. In the last 10 years, our team has produced over 400+ successful projects including numerous prestigious mobile and web apps for big corporations. Rapidsoft Systemd also offers Defentect, an integrated advanced system for Detecting Chemical, Biological, Radiological, Nuclear and Explosive (CBRNE) Threats proactively. This sensor based system can provide pro-active threat detection from terrorists and save lives. This presentation provides some information about Defentect CBRNE safety System. If you are looking for security and safety of homelan, contact us at +1 609 439 4775 for more information.
Citation preview
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
Defentect – A CBRNE Threat Detection System To Detect Terror Threats
Victory Falcon ET.308-B BMI Building
Khalid Bin Walid RoadPO Box 27128, Dubai, UAE.
Phone: +971 4 3554055, Fax:+ 971 4 3552745
Rapidsoft Systems, Inc. 7 Diamond Ct,
Princeton Junction,New Jersey 08550, USA
Phone (Sales):+1-609-439-4775
Brijesh Kumar, Ph.D.COO an CSO, Rapidsoft Systems Inc.Email: [email protected]+1 609 439 4775 (New jersey), USA
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
OverviewMarch 2012
www.defentect.com and www.rapidsoftsystems.com
Who is Defentect ?• Defentect, a publicly traded venture, in the USA
• It developed under its Chairman, Paul Bremer, the former head of the civilian authority in Iraq
• It’s a touchstone in security matters and has developed a platform for integration of surveillance devices and sensors for detection and alerting to protect from Chemical, Biological, Radiation, Nuclear & Explosive threats.
• Defentect’s flagship product is DM3 (Deter + Detect + Defend)
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
Terrorism & SecurityToday
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
“Passing through airports is now such a tormented process the heart sinks as you begin a journey. Remember when flying was
fun? How long ago that seems now…”
Threats: CBRNEResult: Huge Security Expense: Scanners, Security Personnel,
Delays, Huge Recurring Expenditure
One Example: Aviation Sector
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
Currently Perceived Threats against Mass Public and Sensitive Installations and
Structures
• Chemical • Biological• Radioactive • Nuclear• Explosives
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
Detection & Deterrance• Detection of perceived threats in critical and public places are a
must.
• These detecting devices help in timely detection of threats and providing safety to those in the area and they also help deter criminals.
• They help in providing evidence for trials and make prosecutions easier.
• They help in giving an extra advantage to the police and security teams that patrol the areas.
• They give citizens extra peace of mind and feeling of safety
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
Why the Best Security Systems Fail Reasons ?
Reason: The weak links in the security system..
• A Security personnel who is lacks education in modern chemical, electronics and nuclear technology and it’s use by intruders.
• Incorrect interpretation & judgement of the threat signals by Security Personnel .• A security personnel not present at the site of threat.• Intruder intelligently distracts the security personnel and breaches the security• A tired & inattentive security personnel.
Result:
• Missed noticing the threat• Lack of accurate location of threat.• Incorrect information of threat type.• Lack of immediate and co-ordinated communication.• Disconnected inputs lacks overview and interpretation of threat by the central command.• Wrong judgement and delayed action.
Usually most of the Security Systems use sophisticated detectors and technology and still fail. Why ?
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
9
What’s lacking in Current Systems ?Chemical/Radiological/Visual Detection
• Labor intensive and expensive• Require security guards to focus over
protracted time periods and respond manually• Delayed alerts to authorities• How well trained in physics, chemistry are
security personnel manning the computer screens?
• An 8 hour shift does affect judgment.• High incidence of innocent and false positive
alarms.
• Armed guards patrolling a perimeter, peering into darkness, checking ID's.
• The roving guard isn't there when the terrorist races across
• The guard is bored and inattentive because it is the 7th hour of his shift.
• He was bribed by what he thought were run-of-the-mill smugglers to look the other way but who turned out to be terrorists, as happened in Russia.
• The guard himself is a terrorist who has infiltrated the security organization.
What’s lacking in Current Systems ?
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
Distributed & Disconnected
Are we Secure ?
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
Today we have advanced detectors alarm and communication devices…
Scenario:Disconnected Independent Detectors & Alarms Manned & Monitored Continuously by Dedicated Security PersonnelPositive: A Good Deterrent & Reduces Threat Perception
Negatives:Threat Interpretation by an IndividualPossibility of Wrong JudgementDelayed or No relay of Threat to Central Command Disconnected & Uncoordinated Action
Is it Effective ?Yes to a good extent ! BUT can be made BETTER
What’s the Solution• We need an Intelligent Integrated Solution
comprising all known threat sensors. (Video, Audio & CBRNE)
• Continuous Intelligent Monitoring
• Independent of an individual’s security personnel’s alertness, intelligence, knowledge and judgement.
• Alerts all concerned immediately wherever they are.
• Assists the Personnel and Management in making quick decisions
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
What is Defentects business?• Defentect offers a global management and alerting system which reacts to the
detection of chemical, biological, radiological, nuclear and explosive (“CBRNE”) threats.
• Defentect’s proprietary technology detects the threat and immediately notifies key personnel and first responders so that appropriate action can be taken. The software platform is easily integrated with other sensors, making it attractive to many potential partners and manufacturers.
• Defentect’s products and technologies are intended for use in risk management operations for a wide range of international businesses and locations, including the 100,000 sites in the US that are listed as “critical infrastructure” by the Department of Homeland Security.
• Some key targets include but are in no way limited to hospitals and research labs, military and government facilities, border entry points, and public venues such as airports, sport arenas, malls etc.
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
Why Defentect ?DM3 is the only product which has below unique features:
integrating broadly deployed radiation and other sensors flexible messaging to alert multiple recipients of dangerous
radiological, chemical and other hazardous exposures for nuclear power plants, hospitals, and other high-value targets.
The system protects and defends by sending real-time notifications to multiple pre-designated security command centers when the presence of threat-level exposure to radiation, chemicals, or other hazards has been detected.
The integrated Defentect DM3 system enables customers to keep adding other threat event detection capabilities to their security systems.
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
Defentect DM3Proven threat awareness solution
• Developed Under Expert Guidance with Years of Experience in the Security Industry
• Installed, operational and proven in “high value” target facilities in the US.
• Gathers data from virtually any sensor which can live on a data network.
• Seeks and identifies anomalies in the data.• Forwards the new information to an unlimited number of devices on
any platform capable of receiving messages: SMS, email, smartphones, voicemail, XML.
• All instantaneously and independent operating personnel.
16
DM3 Applications Deter
• Defentect can be deployed in critical government & public venues, transit points, financial, industrial as well as various government and military facilities.
Detect
• Locating Defentect at transportation choke points provides the opportunity to detect the illicit movement of various material and assist in thwarting a terrorist attack. These transit sites include border entries; mass transit hubs such as airports subway and train stations; transit infrastructure including weigh stations, bridges and toll booths, ports and private facilities such as truck stops, marinas, gas stations and public storage facilities.
Defend
• Potential targets for a dirty bomb attack represent the third type of location for Defentect deployment. These include commercial buildings, shopping malls, sports venues, entertainment centers, landmarks and tourist sites, critical infrastructure and financial institutions, as well as government and military locations.
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
Why Defentect DM3• Precise, uniform, predictable response without
relying upon personnel training or loyalty.
• Trained personnel is out in the field patrolling, not sitting in a darkened room looking at a computer screen.
• Elimination of variable response from different security personnel.
18
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
19
• Integrated & Intelligent threat detection system that precisely monitor and reduce or eliminate misdiagnosis.
• Defentect’s DM3™ software is the management, monitoring and messaging component that networks to third party sensors, providing administrative and configuration services for a variety of threat-event detection demands.
• Defentect has unique, low cost, integrated, networked, ubiquitous, wide area, unmanned software architecture and sensor technologies that meet this need.
• Our intellectual property is built upon readily available electro-optical devices.
• Defentect’s products graft readily onto existing security systems, minimizing adoption costs and facilitating market penetration.
Why Defentect DM3
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
Defentect DM3Precise and Predictable Security Independent of Personnel
20
Examples of what DM3 can do:
• DM3 can automatically cause video cameras to rotate to cover an entrance when a radiological threat is detected at that entrance without the need for human action.
• DM3 can add sensors as easily as clicking on a website for instantaneous and continually changing security.
• DM3 can pull up data from computer data banks so that when DM3 delivers the pre-specified warning message data from the data storage banks can be sent along as well
DM3 Integrates all the Sensors & Detectors into an Intelligent System
Net Result
Less nos of Security PersonnelImmediate & Correct Threat Detection
Centraliized & Co-ordinated Action PlanQuick Action
Central Command
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
22
The Defentect DM3™ Solution
IMPLEMENTATION
THREAT & VULNERABILITY ASSESSMENT
• Defentect starts with a risk-based threat and vulnerability assessment (TAVA) of the assett.
• TAVA identifies highest level of protection possible for that assett.
• Defentect then works with the stakeholders to design an integrated CONOPS (Concept of Operations)
• Maximizing the value of the networked threat detection technologies, existing building operations, security systems and personnel resources.
COMMISSIONING
• System commissioning involves installing the software & hardware
• Bringing the system online and challenging the system
TRAINING
• Defentect delivers training customized to the CONOPS and SOPs (Standard Operating Procedures).
• Field exercises are conducted to validate the CONOPS and verify the effectiveness of the training.
RESPONSE SERVICES
• Defentect can develop and implement response protocols which may include building control system modifications.
• Our approach distinguishes hoaxes from real events and prevents disruption, while maximizing protection of occupants and physical assets.
Venues Requiring Attention• 12 Areas have been identified as Critical Infrastructures requiring protection from threats. These
infrastructures provide the goods and services that contribute to the national defense and strong economy. The reliability, survivability, and resiliency of these systems allow citizens to maintain a sense of confidence in their country and themselves. These infrastructures identify the quality of life.
• Government -The government itself can be viewed as a critical infrastructure, with its ability to command and control the response to any attack, terrorist or natural to any of our infrastructures
• Defense Systems addressing its dependency on the Defense Industrial Base, and is taking the issues of private industry into its critical infrastructure protection efforts
• Emergency Services -Unfortunately past and present, foreign and domestic, experiences indicate that emergency services response infrastructure and personnel can be the target of deliberate direct or secondary attacks
• Public Transportation -The area includes aviation, rail, pipelines, highways, trucking and bus, and public mass transit. The scope of the transportation sector makes it critical to both our economy and national security.
• Petroleum & Chemical Industry -The sector is also a lucrative terrorist target due environmental impact from the physical destruction of many of its site
• Electricity Plant Infrastructure is required to operate and maintain homes, hospitals, schools, businesses and industrial plants; it is also necessary to refine oil. Disruption of electrical flow or a power grid would impact the economy and defense as well as response and recovery.
• Public Health -This area consists of state/local health departments, hospitals, health clinics, mental health facilities, laboratories, mortuaries, and pharmaceutical stockpiles. All of these would be critical after any form of attack or natural event
• Banking and Finance -The financial sectors infrastructure includes computer networks, storage devices and telecommunications networks. This sector is also extremely vulnerable to public perception; an impression of weakness could easily result in a damaging cascading effect
• Post Office- Anthrax attacks through the postal system cause mail stoppages
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
25
Pilots & Disaster Response Training Exercises
• Participant in Operation Golden Phoenix Federal terrorism response laboratory, San Diego, with U.S. Department of Homeland Security Customs and Border Protection, U.S. Marine Corps Aircraft Group 46, DOD, DEA, FBI, DOJ, DOE
• At Golden Phoenix, Defentect monitored threat-level radiation at Brown Field Airport and Scripps Memorial Hospital La Jolla
Among installations: • AIT Worldwide Logistics, Itasca, IL, a global transportation provider• Bethesda Medical Center, premier Washington Hospital Center for
all senior civilian/military in D.C.
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
27
Sample Defentect Components—Radiological Examples
Product Category DescriptionDefentect DM3™ Software Management, Monitoring &
Messaging
Gammatect™ Gross Gamma Ray Detector
Gammatect Plus™ Fine Isotope Identifier
Presented by: Victory Falcon ET. Dubai UAETel: + 971 4 3554055, [email protected]
28
Competition in Radiological SensorsCompany Product Functionality Remote
AlertingIsotope
IDSensors per
SystemDefentect Group Defentect Ethernet based
radiation detection Yes Yes Unlimited
ICx Technologies webMATE Ethernet based multi-channel analyzer. Sensors detect CBRNE
Yes Yes Unlimited
RAE Systems AreaRAE Wireless multi-gas & gamma radiation detector
Yes. Up to 2 miles from
device
No Stand alone sensor or up to 32 if purchase ProRAE software
Canberra Falcon 5000 Portable radiation detector. Detects location, amount and isotope
Between detector and control unit
ONLY
Yes Stand alone sensor
Thermo Fisher Scientific Viewpoint and standalone
gamma sensors
Remote monitoring software. Integrates company & 3rd party sensors with plug in
Yes with additional
purchase of Viewpoint
Depends upon sensor
Customizable and scalable
Polimatrix Radflash Handheld radiation detector
No Yes Stand alone
Berkeley Nucleonics Rad-D, AreaSAM 1710 radRAM
Rad-D and 1710 radRAM detect either gamma or neutron. AreaSAM is a direct competitor
No AreaSAM only
AreaSAM allows up to 100 nodes, each node encompassing multiple
detectors