SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Defentect – A CBRNE Threat Detection System To Detect Terror Threats
Victory Falcon ET.
308-B BMI Building
Khalid Bin Walid Road
PO Box 27128, Dubai, UAE.
Phone: +971 4 3554055, Fax:+ 971 4 3552745
Rapidsoft Systems, Inc.
7 Diamond Ct,
Princeton Junction,
New Jersey 08550, USA
Phone (Sales):+1-609-439-4775
Brijesh Kumar, Ph.D.
COO an CSO, Rapidsoft Systems Inc.
Email: bkumar@rapidsoftsystems.com
+1 609 439 4775 (New jersey), USA
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Overview
March 2012
www.defentect.com and www.rapidsoftsystems.com
Who is Defentect ?
• Defentect, a publicly traded venture, in the USA
• It developed under its Chairman, Paul Bremer, the former
head of the civilian authority in Iraq
• It’s a touchstone in security matters and has developed a
platform for integration of surveillance devices and sensors
for detection and alerting to protect from Chemical,
Biological, Radiation, Nuclear & Explosive threats.
• Defentect’s flagship product is DM3
(Deter + Detect + Defend)
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Terrorism & SecurityToday
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
“Passing through airports is now such a tormented process the heart sinks as
you begin a journey. Remember when flying was fun?
How long ago that seems now…”
Threats: CBRNE
Result: Huge Security Expense: Scanners, Security Personnel,
Delays, Huge Recurring Expenditure
One Example: Aviation Sector
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Currently Perceived Threats against Mass
Public and Sensitive Installations and
Structures
• Chemical
• Biological
• Radioactive
• Nuclear
• Explosives
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Detection & Deterrance
• Detection of perceived threats in critical and public places are a
must.
• These detecting devices help in timely detection of threats and
providing safety to those in the area and they also help deter
criminals.
• They help in providing evidence for trials and make prosecutions
easier.
• They help in giving an extra advantage to the police and security
teams that patrol the areas.
• They give citizens extra peace of mind and feeling of safety
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Why the Best Security Systems Fail
Reasons ?
Reason: The weak links in the security system..
• A Security personnel who is lacks education in modern chemical, electronics and nuclear
technology and it’s use by intruders.
• Incorrect interpretation & judgement of the threat signals by Security Personnel .
• A security personnel not present at the site of threat.
• Intruder intelligently distracts the security personnel and breaches the security
• A tired & inattentive security personnel.
Result:
• Missed noticing the threat
• Lack of accurate location of threat.
• Incorrect information of threat type.
• Lack of immediate and co-ordinated communication.
• Disconnected inputs lacks overview and interpretation of threat by the central command.
• Wrong judgement and delayed action.
Usually most of the Security Systems use sophisticated detectors and technology
and still fail. Why ?
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
9
What’s lacking in Current Systems ?
Chemical/Radiological/Visual Detection
• Labor intensive and expensive
• Require security guards to focus over
protracted time periods and respond manually
• Delayed alerts to authorities
• How well trained in physics, chemistry are
security personnel manning the computer
screens?
• An 8 hour shift does affect judgment.
• High incidence of innocent and false positive
alarms.
• Armed guards patrolling a perimeter, peering into
darkness, checking ID's.
• The roving guard isn't there when the terrorist races
across
• The guard is bored and inattentive because it is the
7th hour of his shift.
• He was bribed by what he thought were run-of-the-
mill smugglers to look the other way but who turned
out to be terrorists, as happened in Russia.
• The guard himself is a terrorist who has infiltrated the
security organization.
What’s lacking in Current Systems ?
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Distributed & Disconnected
Are we Secure ?
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Today we have advanced detectors alarm and
communication devices…
Scenario:
Disconnected Independent Detectors & Alarms Manned &
Monitored Continuously by Dedicated Security Personnel
Positive: A Good Deterrent & Reduces Threat Perception
Negatives:
Threat Interpretation by an Individual
Possibility of Wrong Judgement
Delayed or No relay of Threat to Central Command
Disconnected & Uncoordinated Action
Is it Effective ?
Yes to a good extent ! BUT can be made BETTER
What’s the Solution
• We need an Intelligent Integrated Solution
comprising all known threat sensors.
(Video, Audio & CBRNE)
• Continuous Intelligent Monitoring
• Independent of an individual’s security personnel’s
alertness, intelligence, knowledge and judgement.
• Alerts all concerned immediately wherever they are.
• Assists the Personnel and Management in making
quick decisions
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
What is Defentects business?
• Defentect offers a global management and alerting system which reacts to the
detection of chemical, biological, radiological, nuclear and explosive (“CBRNE”)
threats.
• Defentect’s proprietary technology detects the threat and immediately notifies
key personnel and first responders so that appropriate action can be taken. The
software platform is easily integrated with other sensors, making it attractive to
many potential partners and manufacturers.
• Defentect’s products and technologies are intended for use in risk management
operations for a wide range of international businesses and locations, including
the 100,000 sites in the US that are listed as “critical infrastructure” by the
Department of Homeland Security.
• Some key targets include but are in no way limited to hospitals and research labs,
military and government facilities, border entry points, and public venues such as
airports, sport arenas, malls etc.
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Why Defentect ?
DM3 is the only product which has below unique features:
 integrating broadly deployed radiation and other sensors
 flexible messaging to alert multiple recipients of dangerous
radiological, chemical and other hazardous exposures for
nuclear power plants, hospitals, and other high-value targets.
 The system protects and defends by sending real-time
notifications to multiple pre-designated security command
centers when the presence of threat-level exposure to
radiation, chemicals, or other hazards has been detected.
 The integrated Defentect DM3 system enables customers to
keep adding other threat event detection capabilities to their
security systems.
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Defentect DM3
Proven threat awareness solution
• Developed Under Expert Guidance with Years of Experience in the
Security Industry
• Installed, operational and proven in “high value” target facilities in
the US.
• Gathers data from virtually any sensor which can live on a data
network.
• Seeks and identifies anomalies in the data.
• Forwards the new information to an unlimited number of devices on
any platform capable of receiving messages: SMS, email,
smartphones, voicemail, XML.
• All instantaneously and independent operating personnel.
16
DM3 Applications
Deter
• Defentect can be deployed in critical government & public venues, transit points,
financial, industrial as well as various government and military facilities.
Detect
• Locating Defentect at transportation choke points provides the opportunity to detect
the illicit movement of various material and assist in thwarting a terrorist attack.
These transit sites include border entries; mass transit hubs such as airports subway
and train stations; transit infrastructure including weigh stations, bridges and toll
booths, ports and private facilities such as truck stops, marinas, gas stations and
public storage facilities.
Defend
• Potential targets for a dirty bomb attack represent the third type of location for
Defentect deployment. These include commercial buildings, shopping malls, sports
venues, entertainment centers, landmarks and tourist sites, critical infrastructure and
financial institutions, as well as government and military locations.
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Why Defentect DM3
• Precise, uniform, predictable response without
relying upon personnel training or loyalty.
• Trained personnel is out in the field patrolling,
not sitting in a darkened room looking at a
computer screen.
• Elimination of variable response from different
security personnel.
18
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
19
• Integrated & Intelligent threat detection system that precisely monitor and
reduce or eliminate misdiagnosis.
• Defentect’s DM3™ software is the management, monitoring and messaging
component that networks to third party sensors, providing administrative and
configuration services for a variety of threat-event detection demands.
• Defentect has unique, low cost, integrated, networked, ubiquitous,
wide area, unmanned software architecture and sensor technologies that meet
this need.
• Our intellectual property is built upon readily available electro-optical devices.
• Defentect’s products graft readily onto existing security systems, minimizing
adoption costs and facilitating market penetration.
Why Defentect DM3
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Defentect DM3
Precise and Predictable Security Independent of Personnel
20
Examples of what DM3 can do:
• DM3 can automatically cause video cameras to rotate to cover an
entrance when a radiological threat is detected at that entrance
without the need for human action.
• DM3 can add sensors as easily as clicking on a website for
instantaneous and continually changing security.
• DM3 can pull up data from computer data banks so that when
DM3 delivers the pre-specified warning message data from the
data storage banks can be sent along as well
DM3 Integrates all the Sensors & Detectors into an
Intelligent System
Net Result
Less nos of Security Personnel
Immediate & Correct Threat Detection
Centraliized & Co-ordinated Action Plan
Quick Action
Central Command
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
22
The Defentect DM3™ Solution
IMPLEMENTATION
THREAT & VULNERABILITY ASSESSMENT
• Defentect starts with a risk-based threat and vulnerability assessment (TAVA) of the assett.
• TAVA identifies highest level of protection possible for that assett.
• Defentect then works with the stakeholders to design an integrated CONOPS (Concept of Operations)
• Maximizing the value of the networked threat detection technologies, existing building operations, security
systems and personnel resources.
COMMISSIONING
• System commissioning involves installing the software & hardware
• Bringing the system online and challenging the system
TRAINING
• Defentect delivers training customized to the CONOPS and SOPs (Standard Operating Procedures).
• Field exercises are conducted to validate the CONOPS and verify the effectiveness of the training.
RESPONSE SERVICES
• Defentect can develop and implement response protocols which may include building control system
modifications.
• Our approach distinguishes hoaxes from real events and prevents disruption, while maximizing protection of
occupants and physical assets.
Venues Requiring Attention
• 12 Areas have been identified as Critical Infrastructures requiring protection from threats. These
infrastructures provide the goods and services that contribute to the national defense and strong economy.
The reliability, survivability, and resiliency of these systems allow citizens to maintain a sense of confidence in
their country and themselves. These infrastructures identify the quality of life.
• Government -The government itself can be viewed as a critical infrastructure, with its ability to command
and control the response to any attack, terrorist or natural to any of our infrastructures
• Defense Systems addressing its dependency on the Defense Industrial Base, and is taking the issues of
private industry into its critical infrastructure protection efforts
• Emergency Services -Unfortunately past and present, foreign and domestic, experiences indicate that
emergency services response infrastructure and personnel can be the target of deliberate direct or secondary
attacks
• Public Transportation -The area includes aviation, rail, pipelines, highways, trucking and bus, and public
mass transit. The scope of the transportation sector makes it critical to both our economy and national
security.
• Petroleum & Chemical Industry -The sector is also a lucrative terrorist target due environmental impact
from the physical destruction of many of its site
• Electricity Plant Infrastructure is required to operate and maintain homes, hospitals, schools, businesses
and industrial plants; it is also necessary to refine oil. Disruption of electrical flow or a power grid would
impact the economy and defense as well as response and recovery.
• Public Health -This area consists of state/local health departments, hospitals, health clinics, mental health
facilities, laboratories, mortuaries, and pharmaceutical stockpiles. All of these would be critical after any form
of attack or natural event
• Banking and Finance -The financial sectors infrastructure includes computer networks, storage devices and
telecommunications networks. This sector is also extremely vulnerable to public perception; an impression
of weakness could easily result in a damaging cascading effect
• Post Office- Anthrax attacks through the postal system cause mail stoppages
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
25
Pilots & Disaster Response Training
Exercises
• Participant in Operation Golden Phoenix Federal terrorism response
laboratory, San Diego, with U.S. Department of Homeland Security
Customs and Border Protection, U.S. Marine Corps Aircraft Group
46, DOD, DEA, FBI, DOJ, DOE
• At Golden Phoenix, Defentect monitored threat-level radiation at
Brown Field Airport and Scripps Memorial Hospital La Jolla
Among installations:
• AIT Worldwide Logistics, Itasca, IL, a global transportation provider
• Bethesda Medical Center, premier Washington Hospital Center for
all senior civilian/military in D.C.
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
APPENDIX A
26
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
27
Sample Defentect Components—
Radiological Examples
Product Category Description
Defentect DM3™ Software Management, Monitoring &
Messaging
Gammatect™ Gross Gamma Ray
Detector
Gammatect Plus™ Fine Isotope Identifier
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
28
Competition in Radiological Sensors
Company Product Functionality Remote
Alerting
Isotope
ID
Sensors per
System
Defentect Group Defentect Ethernet based
radiation detection
Yes Yes Unlimited
ICx Technologies webMATE Ethernet based multi-
channel analyzer.
Sensors detect CBRNE
Yes Yes Unlimited
RAE Systems AreaRAE Wireless multi-gas &
gamma radiation
detector
Yes. Up to 2
miles from
device
No Stand alone sensor or
up to 32 if purchase
ProRAE software
Canberra Falcon 5000 Portable radiation
detector. Detects
location, amount and
isotope
Between
detector and
control unit
ONLY
Yes Stand alone sensor
Thermo Fisher Scientific Viewpoint and
standalone
gamma sensors
Remote monitoring
software. Integrates
company & 3rd party
sensors with plug in
Yes with
additional
purchase of
Viewpoint
Depends upon
sensor
Customizable and
scalable
Polimatrix Radflash Handheld radiation
detector
No Yes Stand alone
Berkeley Nucleonics Rad-D, AreaSAM
1710 radRAM
Rad-D and 1710 radRAM
detect either gamma or
neutron. AreaSAM is a
direct competitor
No AreaSAM
only
AreaSAM allows up to
100 nodes, each node
encompassing multiple
detectors

Weitere ähnliche Inhalte

Was ist angesagt?

Africor Risk Management 111001
Africor Risk Management 111001Africor Risk Management 111001
Africor Risk Management 111001bdsafricor
 
Code of practice for physical security systems in banks
Code of practice for physical security systems in banksCode of practice for physical security systems in banks
Code of practice for physical security systems in banksSamer Al Basha
 
Make Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMichael Davis
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
 
Stranded jet skier breaches JFK's $100M security
Stranded jet skier breaches JFK's $100M securityStranded jet skier breaches JFK's $100M security
Stranded jet skier breaches JFK's $100M securityHafiza Abas
 
It risk assessment_methodology
It risk assessment_methodology It risk assessment_methodology
It risk assessment_methodology Bruno Mmassy
 
Low-altitude anti-drone solution
Low-altitude anti-drone solutionLow-altitude anti-drone solution
Low-altitude anti-drone solutionRaginetech
 
Maritime Cyber Security Education
Maritime Cyber Security EducationMaritime Cyber Security Education
Maritime Cyber Security EducationValentin Bañaco
 
FUTURE JANUARY2012ppt
FUTURE JANUARY2012pptFUTURE JANUARY2012ppt
FUTURE JANUARY2012pptstone Johnson
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber StrategyIan Kelly
 
SMi Group's 7th annual International Port Security 2016
SMi Group's 7th annual International Port Security 2016SMi Group's 7th annual International Port Security 2016
SMi Group's 7th annual International Port Security 2016Dale Butler
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaAngeloluca Barba
 
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...DroneSec
 
Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussionRussell Publishing
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructureNeha Agarwal
 
Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...IBM Sverige
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsVi Tính Hoàng Nam
 
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...Nexie_verena
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 
INTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYINTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYAndrew Bichlmeier
 

Was ist angesagt? (20)

Africor Risk Management 111001
Africor Risk Management 111001Africor Risk Management 111001
Africor Risk Management 111001
 
Code of practice for physical security systems in banks
Code of practice for physical security systems in banksCode of practice for physical security systems in banks
Code of practice for physical security systems in banks
 
Make Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile Security
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
Stranded jet skier breaches JFK's $100M security
Stranded jet skier breaches JFK's $100M securityStranded jet skier breaches JFK's $100M security
Stranded jet skier breaches JFK's $100M security
 
It risk assessment_methodology
It risk assessment_methodology It risk assessment_methodology
It risk assessment_methodology
 
Low-altitude anti-drone solution
Low-altitude anti-drone solutionLow-altitude anti-drone solution
Low-altitude anti-drone solution
 
Maritime Cyber Security Education
Maritime Cyber Security EducationMaritime Cyber Security Education
Maritime Cyber Security Education
 
FUTURE JANUARY2012ppt
FUTURE JANUARY2012pptFUTURE JANUARY2012ppt
FUTURE JANUARY2012ppt
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
SMi Group's 7th annual International Port Security 2016
SMi Group's 7th annual International Port Security 2016SMi Group's 7th annual International Port Security 2016
SMi Group's 7th annual International Port Security 2016
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
 
Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussion
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
 
Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 
INTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYINTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITY
 

Ähnlich wie Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THreats

Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response MethodologySignals Defense, LLC
 
Remote Guarding Vendor Tool
Remote Guarding Vendor ToolRemote Guarding Vendor Tool
Remote Guarding Vendor ToolElite ISI
 
Cybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsCybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsVertex Holdings
 
ACS Newsletter 20 years Feb 2015
ACS Newsletter 20 years Feb 2015ACS Newsletter 20 years Feb 2015
ACS Newsletter 20 years Feb 2015Riaan Bellingan
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Dr. Idris Ahmed
 
Safety & security in hotels
Safety & security  in hotelsSafety & security  in hotels
Safety & security in hotelsAMALDASKH
 
Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Xerxes Oosthuizen
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017Riaan Bellingan
 
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealthInvest
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limitedoomagoolies
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptxrabeetkashif
 

Ähnlich wie Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THreats (20)

Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response Methodology
 
Remote Guarding Vendor Tool
Remote Guarding Vendor ToolRemote Guarding Vendor Tool
Remote Guarding Vendor Tool
 
Cybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environmentsCybersecurity | D-fend: Counter drone solution for urban environments
Cybersecurity | D-fend: Counter drone solution for urban environments
 
ACS Newsletter 20 years Feb 2015
ACS Newsletter 20 years Feb 2015ACS Newsletter 20 years Feb 2015
ACS Newsletter 20 years Feb 2015
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
 
Safety & security in hotels
Safety & security  in hotelsSafety & security  in hotels
Safety & security in hotels
 
Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Stu r37 a
Stu r37 aStu r37 a
Stu r37 a
 
File000154
File000154File000154
File000154
 
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limited
 
2m Solutions
2m Solutions2m Solutions
2m Solutions
 
Stu r35 b
Stu r35 bStu r35 b
Stu r35 b
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
 
Ht r32
Ht r32Ht r32
Ht r32
 

Kürzlich hochgeladen

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THreats

  • 1. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae Defentect – A CBRNE Threat Detection System To Detect Terror Threats Victory Falcon ET. 308-B BMI Building Khalid Bin Walid Road PO Box 27128, Dubai, UAE. Phone: +971 4 3554055, Fax:+ 971 4 3552745 Rapidsoft Systems, Inc. 7 Diamond Ct, Princeton Junction, New Jersey 08550, USA Phone (Sales):+1-609-439-4775 Brijesh Kumar, Ph.D. COO an CSO, Rapidsoft Systems Inc. Email: bkumar@rapidsoftsystems.com +1 609 439 4775 (New jersey), USA
  • 2. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae Overview March 2012 www.defentect.com and www.rapidsoftsystems.com
  • 3. Who is Defentect ? • Defentect, a publicly traded venture, in the USA • It developed under its Chairman, Paul Bremer, the former head of the civilian authority in Iraq • It’s a touchstone in security matters and has developed a platform for integration of surveillance devices and sensors for detection and alerting to protect from Chemical, Biological, Radiation, Nuclear & Explosive threats. • Defentect’s flagship product is DM3 (Deter + Detect + Defend) Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae
  • 4. Terrorism & SecurityToday Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae
  • 5. “Passing through airports is now such a tormented process the heart sinks as you begin a journey. Remember when flying was fun? How long ago that seems now…” Threats: CBRNE Result: Huge Security Expense: Scanners, Security Personnel, Delays, Huge Recurring Expenditure One Example: Aviation Sector Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae
  • 6. Currently Perceived Threats against Mass Public and Sensitive Installations and Structures • Chemical • Biological • Radioactive • Nuclear • Explosives Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae
  • 7. Detection & Deterrance • Detection of perceived threats in critical and public places are a must. • These detecting devices help in timely detection of threats and providing safety to those in the area and they also help deter criminals. • They help in providing evidence for trials and make prosecutions easier. • They help in giving an extra advantage to the police and security teams that patrol the areas. • They give citizens extra peace of mind and feeling of safety Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae
  • 8. Why the Best Security Systems Fail Reasons ? Reason: The weak links in the security system.. • A Security personnel who is lacks education in modern chemical, electronics and nuclear technology and it’s use by intruders. • Incorrect interpretation & judgement of the threat signals by Security Personnel . • A security personnel not present at the site of threat. • Intruder intelligently distracts the security personnel and breaches the security • A tired & inattentive security personnel. Result: • Missed noticing the threat • Lack of accurate location of threat. • Incorrect information of threat type. • Lack of immediate and co-ordinated communication. • Disconnected inputs lacks overview and interpretation of threat by the central command. • Wrong judgement and delayed action. Usually most of the Security Systems use sophisticated detectors and technology and still fail. Why ?
  • 9. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae 9 What’s lacking in Current Systems ? Chemical/Radiological/Visual Detection • Labor intensive and expensive • Require security guards to focus over protracted time periods and respond manually • Delayed alerts to authorities • How well trained in physics, chemistry are security personnel manning the computer screens? • An 8 hour shift does affect judgment. • High incidence of innocent and false positive alarms.
  • 10. • Armed guards patrolling a perimeter, peering into darkness, checking ID's. • The roving guard isn't there when the terrorist races across • The guard is bored and inattentive because it is the 7th hour of his shift. • He was bribed by what he thought were run-of-the- mill smugglers to look the other way but who turned out to be terrorists, as happened in Russia. • The guard himself is a terrorist who has infiltrated the security organization. What’s lacking in Current Systems ? Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae
  • 11. Distributed & Disconnected Are we Secure ? Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae
  • 12. Today we have advanced detectors alarm and communication devices… Scenario: Disconnected Independent Detectors & Alarms Manned & Monitored Continuously by Dedicated Security Personnel Positive: A Good Deterrent & Reduces Threat Perception Negatives: Threat Interpretation by an Individual Possibility of Wrong Judgement Delayed or No relay of Threat to Central Command Disconnected & Uncoordinated Action Is it Effective ? Yes to a good extent ! BUT can be made BETTER
  • 13. What’s the Solution • We need an Intelligent Integrated Solution comprising all known threat sensors. (Video, Audio & CBRNE) • Continuous Intelligent Monitoring • Independent of an individual’s security personnel’s alertness, intelligence, knowledge and judgement. • Alerts all concerned immediately wherever they are. • Assists the Personnel and Management in making quick decisions Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae
  • 14. What is Defentects business? • Defentect offers a global management and alerting system which reacts to the detection of chemical, biological, radiological, nuclear and explosive (“CBRNE”) threats. • Defentect’s proprietary technology detects the threat and immediately notifies key personnel and first responders so that appropriate action can be taken. The software platform is easily integrated with other sensors, making it attractive to many potential partners and manufacturers. • Defentect’s products and technologies are intended for use in risk management operations for a wide range of international businesses and locations, including the 100,000 sites in the US that are listed as “critical infrastructure” by the Department of Homeland Security. • Some key targets include but are in no way limited to hospitals and research labs, military and government facilities, border entry points, and public venues such as airports, sport arenas, malls etc. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae
  • 15. Why Defentect ? DM3 is the only product which has below unique features:  integrating broadly deployed radiation and other sensors  flexible messaging to alert multiple recipients of dangerous radiological, chemical and other hazardous exposures for nuclear power plants, hospitals, and other high-value targets.  The system protects and defends by sending real-time notifications to multiple pre-designated security command centers when the presence of threat-level exposure to radiation, chemicals, or other hazards has been detected.  The integrated Defentect DM3 system enables customers to keep adding other threat event detection capabilities to their security systems. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae
  • 16. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae Defentect DM3 Proven threat awareness solution • Developed Under Expert Guidance with Years of Experience in the Security Industry • Installed, operational and proven in “high value” target facilities in the US. • Gathers data from virtually any sensor which can live on a data network. • Seeks and identifies anomalies in the data. • Forwards the new information to an unlimited number of devices on any platform capable of receiving messages: SMS, email, smartphones, voicemail, XML. • All instantaneously and independent operating personnel. 16
  • 17. DM3 Applications Deter • Defentect can be deployed in critical government & public venues, transit points, financial, industrial as well as various government and military facilities. Detect • Locating Defentect at transportation choke points provides the opportunity to detect the illicit movement of various material and assist in thwarting a terrorist attack. These transit sites include border entries; mass transit hubs such as airports subway and train stations; transit infrastructure including weigh stations, bridges and toll booths, ports and private facilities such as truck stops, marinas, gas stations and public storage facilities. Defend • Potential targets for a dirty bomb attack represent the third type of location for Defentect deployment. These include commercial buildings, shopping malls, sports venues, entertainment centers, landmarks and tourist sites, critical infrastructure and financial institutions, as well as government and military locations. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae
  • 18. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae Why Defentect DM3 • Precise, uniform, predictable response without relying upon personnel training or loyalty. • Trained personnel is out in the field patrolling, not sitting in a darkened room looking at a computer screen. • Elimination of variable response from different security personnel. 18
  • 19. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae 19 • Integrated & Intelligent threat detection system that precisely monitor and reduce or eliminate misdiagnosis. • Defentect’s DM3™ software is the management, monitoring and messaging component that networks to third party sensors, providing administrative and configuration services for a variety of threat-event detection demands. • Defentect has unique, low cost, integrated, networked, ubiquitous, wide area, unmanned software architecture and sensor technologies that meet this need. • Our intellectual property is built upon readily available electro-optical devices. • Defentect’s products graft readily onto existing security systems, minimizing adoption costs and facilitating market penetration. Why Defentect DM3
  • 20. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae Defentect DM3 Precise and Predictable Security Independent of Personnel 20 Examples of what DM3 can do: • DM3 can automatically cause video cameras to rotate to cover an entrance when a radiological threat is detected at that entrance without the need for human action. • DM3 can add sensors as easily as clicking on a website for instantaneous and continually changing security. • DM3 can pull up data from computer data banks so that when DM3 delivers the pre-specified warning message data from the data storage banks can be sent along as well
  • 21. DM3 Integrates all the Sensors & Detectors into an Intelligent System Net Result Less nos of Security Personnel Immediate & Correct Threat Detection Centraliized & Co-ordinated Action Plan Quick Action Central Command
  • 22. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae 22 The Defentect DM3™ Solution
  • 23. IMPLEMENTATION THREAT & VULNERABILITY ASSESSMENT • Defentect starts with a risk-based threat and vulnerability assessment (TAVA) of the assett. • TAVA identifies highest level of protection possible for that assett. • Defentect then works with the stakeholders to design an integrated CONOPS (Concept of Operations) • Maximizing the value of the networked threat detection technologies, existing building operations, security systems and personnel resources. COMMISSIONING • System commissioning involves installing the software & hardware • Bringing the system online and challenging the system TRAINING • Defentect delivers training customized to the CONOPS and SOPs (Standard Operating Procedures). • Field exercises are conducted to validate the CONOPS and verify the effectiveness of the training. RESPONSE SERVICES • Defentect can develop and implement response protocols which may include building control system modifications. • Our approach distinguishes hoaxes from real events and prevents disruption, while maximizing protection of occupants and physical assets.
  • 24. Venues Requiring Attention • 12 Areas have been identified as Critical Infrastructures requiring protection from threats. These infrastructures provide the goods and services that contribute to the national defense and strong economy. The reliability, survivability, and resiliency of these systems allow citizens to maintain a sense of confidence in their country and themselves. These infrastructures identify the quality of life. • Government -The government itself can be viewed as a critical infrastructure, with its ability to command and control the response to any attack, terrorist or natural to any of our infrastructures • Defense Systems addressing its dependency on the Defense Industrial Base, and is taking the issues of private industry into its critical infrastructure protection efforts • Emergency Services -Unfortunately past and present, foreign and domestic, experiences indicate that emergency services response infrastructure and personnel can be the target of deliberate direct or secondary attacks • Public Transportation -The area includes aviation, rail, pipelines, highways, trucking and bus, and public mass transit. The scope of the transportation sector makes it critical to both our economy and national security. • Petroleum & Chemical Industry -The sector is also a lucrative terrorist target due environmental impact from the physical destruction of many of its site • Electricity Plant Infrastructure is required to operate and maintain homes, hospitals, schools, businesses and industrial plants; it is also necessary to refine oil. Disruption of electrical flow or a power grid would impact the economy and defense as well as response and recovery. • Public Health -This area consists of state/local health departments, hospitals, health clinics, mental health facilities, laboratories, mortuaries, and pharmaceutical stockpiles. All of these would be critical after any form of attack or natural event • Banking and Finance -The financial sectors infrastructure includes computer networks, storage devices and telecommunications networks. This sector is also extremely vulnerable to public perception; an impression of weakness could easily result in a damaging cascading effect • Post Office- Anthrax attacks through the postal system cause mail stoppages
  • 25. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae 25 Pilots & Disaster Response Training Exercises • Participant in Operation Golden Phoenix Federal terrorism response laboratory, San Diego, with U.S. Department of Homeland Security Customs and Border Protection, U.S. Marine Corps Aircraft Group 46, DOD, DEA, FBI, DOJ, DOE • At Golden Phoenix, Defentect monitored threat-level radiation at Brown Field Airport and Scripps Memorial Hospital La Jolla Among installations: • AIT Worldwide Logistics, Itasca, IL, a global transportation provider • Bethesda Medical Center, premier Washington Hospital Center for all senior civilian/military in D.C.
  • 26. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae APPENDIX A 26
  • 27. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae 27 Sample Defentect Components— Radiological Examples Product Category Description Defentect DM3™ Software Management, Monitoring & Messaging Gammatect™ Gross Gamma Ray Detector Gammatect Plus™ Fine Isotope Identifier
  • 28. Presented by: Victory Falcon ET. Dubai UAE Tel: + 971 4 3554055, vicmea@eim.ae 28 Competition in Radiological Sensors Company Product Functionality Remote Alerting Isotope ID Sensors per System Defentect Group Defentect Ethernet based radiation detection Yes Yes Unlimited ICx Technologies webMATE Ethernet based multi- channel analyzer. Sensors detect CBRNE Yes Yes Unlimited RAE Systems AreaRAE Wireless multi-gas & gamma radiation detector Yes. Up to 2 miles from device No Stand alone sensor or up to 32 if purchase ProRAE software Canberra Falcon 5000 Portable radiation detector. Detects location, amount and isotope Between detector and control unit ONLY Yes Stand alone sensor Thermo Fisher Scientific Viewpoint and standalone gamma sensors Remote monitoring software. Integrates company & 3rd party sensors with plug in Yes with additional purchase of Viewpoint Depends upon sensor Customizable and scalable Polimatrix Radflash Handheld radiation detector No Yes Stand alone Berkeley Nucleonics Rad-D, AreaSAM 1710 radRAM Rad-D and 1710 radRAM detect either gamma or neutron. AreaSAM is a direct competitor No AreaSAM only AreaSAM allows up to 100 nodes, each node encompassing multiple detectors

Hinweis der Redaktion

  1. This diagram outlines the system components… DefenTect GammaTect Sensors GammaTect-Plus Alert engine Integration with other security systems