Rapidsoft Systems (http:///www.rapidsoftsystems.com) is a leading outsourced software development, and IT service company based in NJ with offices in the US, India and Middle East. In the last 10 years, our team has produced over 400+ successful projects including numerous prestigious mobile and web apps for big corporations.
Rapidsoft Systemd also offers Defentect, an integrated advanced system for Detecting Chemical, Biological, Radiological, Nuclear and Explosive (CBRNE) Threats proactively. This sensor based system can provide pro-active threat detection from terrorists and save lives.
This presentation provides some information about Defentect CBRNE safety System. If you are looking for security and safety of homelan, contact us at +1 609 439 4775 for more information.
Boost PC performance: How more available memory can improve productivity
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THreats
1. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Defentect – A CBRNE Threat Detection System To Detect Terror Threats
Victory Falcon ET.
308-B BMI Building
Khalid Bin Walid Road
PO Box 27128, Dubai, UAE.
Phone: +971 4 3554055, Fax:+ 971 4 3552745
Rapidsoft Systems, Inc.
7 Diamond Ct,
Princeton Junction,
New Jersey 08550, USA
Phone (Sales):+1-609-439-4775
Brijesh Kumar, Ph.D.
COO an CSO, Rapidsoft Systems Inc.
Email: bkumar@rapidsoftsystems.com
+1 609 439 4775 (New jersey), USA
2. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Overview
March 2012
www.defentect.com and www.rapidsoftsystems.com
3. Who is Defentect ?
• Defentect, a publicly traded venture, in the USA
• It developed under its Chairman, Paul Bremer, the former
head of the civilian authority in Iraq
• It’s a touchstone in security matters and has developed a
platform for integration of surveillance devices and sensors
for detection and alerting to protect from Chemical,
Biological, Radiation, Nuclear & Explosive threats.
• Defentect’s flagship product is DM3
(Deter + Detect + Defend)
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
5. “Passing through airports is now such a tormented process the heart sinks as
you begin a journey. Remember when flying was fun?
How long ago that seems now…”
Threats: CBRNE
Result: Huge Security Expense: Scanners, Security Personnel,
Delays, Huge Recurring Expenditure
One Example: Aviation Sector
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
6. Currently Perceived Threats against Mass
Public and Sensitive Installations and
Structures
• Chemical
• Biological
• Radioactive
• Nuclear
• Explosives
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
7. Detection & Deterrance
• Detection of perceived threats in critical and public places are a
must.
• These detecting devices help in timely detection of threats and
providing safety to those in the area and they also help deter
criminals.
• They help in providing evidence for trials and make prosecutions
easier.
• They help in giving an extra advantage to the police and security
teams that patrol the areas.
• They give citizens extra peace of mind and feeling of safety
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
8. Why the Best Security Systems Fail
Reasons ?
Reason: The weak links in the security system..
• A Security personnel who is lacks education in modern chemical, electronics and nuclear
technology and it’s use by intruders.
• Incorrect interpretation & judgement of the threat signals by Security Personnel .
• A security personnel not present at the site of threat.
• Intruder intelligently distracts the security personnel and breaches the security
• A tired & inattentive security personnel.
Result:
• Missed noticing the threat
• Lack of accurate location of threat.
• Incorrect information of threat type.
• Lack of immediate and co-ordinated communication.
• Disconnected inputs lacks overview and interpretation of threat by the central command.
• Wrong judgement and delayed action.
Usually most of the Security Systems use sophisticated detectors and technology
and still fail. Why ?
9. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
9
What’s lacking in Current Systems ?
Chemical/Radiological/Visual Detection
• Labor intensive and expensive
• Require security guards to focus over
protracted time periods and respond manually
• Delayed alerts to authorities
• How well trained in physics, chemistry are
security personnel manning the computer
screens?
• An 8 hour shift does affect judgment.
• High incidence of innocent and false positive
alarms.
10. • Armed guards patrolling a perimeter, peering into
darkness, checking ID's.
• The roving guard isn't there when the terrorist races
across
• The guard is bored and inattentive because it is the
7th hour of his shift.
• He was bribed by what he thought were run-of-the-
mill smugglers to look the other way but who turned
out to be terrorists, as happened in Russia.
• The guard himself is a terrorist who has infiltrated the
security organization.
What’s lacking in Current Systems ?
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
12. Today we have advanced detectors alarm and
communication devices…
Scenario:
Disconnected Independent Detectors & Alarms Manned &
Monitored Continuously by Dedicated Security Personnel
Positive: A Good Deterrent & Reduces Threat Perception
Negatives:
Threat Interpretation by an Individual
Possibility of Wrong Judgement
Delayed or No relay of Threat to Central Command
Disconnected & Uncoordinated Action
Is it Effective ?
Yes to a good extent ! BUT can be made BETTER
13. What’s the Solution
• We need an Intelligent Integrated Solution
comprising all known threat sensors.
(Video, Audio & CBRNE)
• Continuous Intelligent Monitoring
• Independent of an individual’s security personnel’s
alertness, intelligence, knowledge and judgement.
• Alerts all concerned immediately wherever they are.
• Assists the Personnel and Management in making
quick decisions
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
14. What is Defentects business?
• Defentect offers a global management and alerting system which reacts to the
detection of chemical, biological, radiological, nuclear and explosive (“CBRNE”)
threats.
• Defentect’s proprietary technology detects the threat and immediately notifies
key personnel and first responders so that appropriate action can be taken. The
software platform is easily integrated with other sensors, making it attractive to
many potential partners and manufacturers.
• Defentect’s products and technologies are intended for use in risk management
operations for a wide range of international businesses and locations, including
the 100,000 sites in the US that are listed as “critical infrastructure” by the
Department of Homeland Security.
• Some key targets include but are in no way limited to hospitals and research labs,
military and government facilities, border entry points, and public venues such as
airports, sport arenas, malls etc.
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
15. Why Defentect ?
DM3 is the only product which has below unique features:
integrating broadly deployed radiation and other sensors
flexible messaging to alert multiple recipients of dangerous
radiological, chemical and other hazardous exposures for
nuclear power plants, hospitals, and other high-value targets.
The system protects and defends by sending real-time
notifications to multiple pre-designated security command
centers when the presence of threat-level exposure to
radiation, chemicals, or other hazards has been detected.
The integrated Defentect DM3 system enables customers to
keep adding other threat event detection capabilities to their
security systems.
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
16. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Defentect DM3
Proven threat awareness solution
• Developed Under Expert Guidance with Years of Experience in the
Security Industry
• Installed, operational and proven in “high value” target facilities in
the US.
• Gathers data from virtually any sensor which can live on a data
network.
• Seeks and identifies anomalies in the data.
• Forwards the new information to an unlimited number of devices on
any platform capable of receiving messages: SMS, email,
smartphones, voicemail, XML.
• All instantaneously and independent operating personnel.
16
17. DM3 Applications
Deter
• Defentect can be deployed in critical government & public venues, transit points,
financial, industrial as well as various government and military facilities.
Detect
• Locating Defentect at transportation choke points provides the opportunity to detect
the illicit movement of various material and assist in thwarting a terrorist attack.
These transit sites include border entries; mass transit hubs such as airports subway
and train stations; transit infrastructure including weigh stations, bridges and toll
booths, ports and private facilities such as truck stops, marinas, gas stations and
public storage facilities.
Defend
• Potential targets for a dirty bomb attack represent the third type of location for
Defentect deployment. These include commercial buildings, shopping malls, sports
venues, entertainment centers, landmarks and tourist sites, critical infrastructure and
financial institutions, as well as government and military locations.
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
18. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Why Defentect DM3
• Precise, uniform, predictable response without
relying upon personnel training or loyalty.
• Trained personnel is out in the field patrolling,
not sitting in a darkened room looking at a
computer screen.
• Elimination of variable response from different
security personnel.
18
19. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
19
• Integrated & Intelligent threat detection system that precisely monitor and
reduce or eliminate misdiagnosis.
• Defentect’s DM3™ software is the management, monitoring and messaging
component that networks to third party sensors, providing administrative and
configuration services for a variety of threat-event detection demands.
• Defentect has unique, low cost, integrated, networked, ubiquitous,
wide area, unmanned software architecture and sensor technologies that meet
this need.
• Our intellectual property is built upon readily available electro-optical devices.
• Defentect’s products graft readily onto existing security systems, minimizing
adoption costs and facilitating market penetration.
Why Defentect DM3
20. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Defentect DM3
Precise and Predictable Security Independent of Personnel
20
Examples of what DM3 can do:
• DM3 can automatically cause video cameras to rotate to cover an
entrance when a radiological threat is detected at that entrance
without the need for human action.
• DM3 can add sensors as easily as clicking on a website for
instantaneous and continually changing security.
• DM3 can pull up data from computer data banks so that when
DM3 delivers the pre-specified warning message data from the
data storage banks can be sent along as well
21. DM3 Integrates all the Sensors & Detectors into an
Intelligent System
Net Result
Less nos of Security Personnel
Immediate & Correct Threat Detection
Centraliized & Co-ordinated Action Plan
Quick Action
Central Command
23. IMPLEMENTATION
THREAT & VULNERABILITY ASSESSMENT
• Defentect starts with a risk-based threat and vulnerability assessment (TAVA) of the assett.
• TAVA identifies highest level of protection possible for that assett.
• Defentect then works with the stakeholders to design an integrated CONOPS (Concept of Operations)
• Maximizing the value of the networked threat detection technologies, existing building operations, security
systems and personnel resources.
COMMISSIONING
• System commissioning involves installing the software & hardware
• Bringing the system online and challenging the system
TRAINING
• Defentect delivers training customized to the CONOPS and SOPs (Standard Operating Procedures).
• Field exercises are conducted to validate the CONOPS and verify the effectiveness of the training.
RESPONSE SERVICES
• Defentect can develop and implement response protocols which may include building control system
modifications.
• Our approach distinguishes hoaxes from real events and prevents disruption, while maximizing protection of
occupants and physical assets.
24. Venues Requiring Attention
• 12 Areas have been identified as Critical Infrastructures requiring protection from threats. These
infrastructures provide the goods and services that contribute to the national defense and strong economy.
The reliability, survivability, and resiliency of these systems allow citizens to maintain a sense of confidence in
their country and themselves. These infrastructures identify the quality of life.
• Government -The government itself can be viewed as a critical infrastructure, with its ability to command
and control the response to any attack, terrorist or natural to any of our infrastructures
• Defense Systems addressing its dependency on the Defense Industrial Base, and is taking the issues of
private industry into its critical infrastructure protection efforts
• Emergency Services -Unfortunately past and present, foreign and domestic, experiences indicate that
emergency services response infrastructure and personnel can be the target of deliberate direct or secondary
attacks
• Public Transportation -The area includes aviation, rail, pipelines, highways, trucking and bus, and public
mass transit. The scope of the transportation sector makes it critical to both our economy and national
security.
• Petroleum & Chemical Industry -The sector is also a lucrative terrorist target due environmental impact
from the physical destruction of many of its site
• Electricity Plant Infrastructure is required to operate and maintain homes, hospitals, schools, businesses
and industrial plants; it is also necessary to refine oil. Disruption of electrical flow or a power grid would
impact the economy and defense as well as response and recovery.
• Public Health -This area consists of state/local health departments, hospitals, health clinics, mental health
facilities, laboratories, mortuaries, and pharmaceutical stockpiles. All of these would be critical after any form
of attack or natural event
• Banking and Finance -The financial sectors infrastructure includes computer networks, storage devices and
telecommunications networks. This sector is also extremely vulnerable to public perception; an impression
of weakness could easily result in a damaging cascading effect
• Post Office- Anthrax attacks through the postal system cause mail stoppages
25. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
25
Pilots & Disaster Response Training
Exercises
• Participant in Operation Golden Phoenix Federal terrorism response
laboratory, San Diego, with U.S. Department of Homeland Security
Customs and Border Protection, U.S. Marine Corps Aircraft Group
46, DOD, DEA, FBI, DOJ, DOE
• At Golden Phoenix, Defentect monitored threat-level radiation at
Brown Field Airport and Scripps Memorial Hospital La Jolla
Among installations:
• AIT Worldwide Logistics, Itasca, IL, a global transportation provider
• Bethesda Medical Center, premier Washington Hospital Center for
all senior civilian/military in D.C.
28. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
28
Competition in Radiological Sensors
Company Product Functionality Remote
Alerting
Isotope
ID
Sensors per
System
Defentect Group Defentect Ethernet based
radiation detection
Yes Yes Unlimited
ICx Technologies webMATE Ethernet based multi-
channel analyzer.
Sensors detect CBRNE
Yes Yes Unlimited
RAE Systems AreaRAE Wireless multi-gas &
gamma radiation
detector
Yes. Up to 2
miles from
device
No Stand alone sensor or
up to 32 if purchase
ProRAE software
Canberra Falcon 5000 Portable radiation
detector. Detects
location, amount and
isotope
Between
detector and
control unit
ONLY
Yes Stand alone sensor
Thermo Fisher Scientific Viewpoint and
standalone
gamma sensors
Remote monitoring
software. Integrates
company & 3rd party
sensors with plug in
Yes with
additional
purchase of
Viewpoint
Depends upon
sensor
Customizable and
scalable
Polimatrix Radflash Handheld radiation
detector
No Yes Stand alone
Berkeley Nucleonics Rad-D, AreaSAM
1710 radRAM
Rad-D and 1710 radRAM
detect either gamma or
neutron. AreaSAM is a
direct competitor
No AreaSAM
only
AreaSAM allows up to
100 nodes, each node
encompassing multiple
detectors
Hinweis der Redaktion
This diagram outlines the system components…
DefenTect
GammaTect Sensors
GammaTect-Plus
Alert engine
Integration with other security systems