28
SMi CBRN 20 September, 2006 Evolutionary Detection and Prevention of Improvised Explosive Devices and Related Terrorist Weapons TETRAD Technologies Group, Inc. Richmond, VA (USA) Martin Joseph Dudziak PhD REMOVE THIS: I have edited only certain things, not sure about changing other text (like company name) since this was something from a conference in 2006

Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Embed Size (px)

Citation preview

Page 1: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

SMi CBRN 20 September, 2006

Evolutionary Detection and Prevention of Improvised Explosive Devices and Related Terrorist Weapons

TETRAD Technologies Group, Inc.Richmond, VA (USA)

Martin Joseph Dudziak PhD

REMOVE THIS: I have edited only certain things, not sure about changing other text (like company name) since this was something from a conference in 2006

Page 2: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Three Absolutes for Adequate ProtectionAgainst Today’s and Tomorrow’s Terrorists

• Ability to Think and Act Ahead, not merely reactively, postfacto

Copyright 2006 TETRAD Technologies Group, Inc.

• High-sensitivity for multiple substances in diverse environments• Not limited to one type of chemical agents• Not restricted to particular operating environments and

architectures (functional and literal chokepoints and get-arounds)

• Usability – the non-technical-specialist needs to be able to use this effectively without a great deal of concentration or specialized learning(If it is so specialized and sensitive, it will have predictable operational fail-points)

Conventional TNT

Compact C4, Cemtex

HMTD, TATP

????

Martin, 7.jan.10:

for instance, one can add not only body-wrap but body-cavity-insert weaponry - the drug carriers perfected that art long ago

Martin, 7.jan.10:

for instance, one can add not only body-wrap but body-cavity-insert weaponry - the drug carriers perfected that art long ago

Page 3: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

High-Demand Challenges

• Weapon Technology– Chemistry– Architecture– Concealment

• Weapon Effectiveness– Fault-tolerance and Fail-safe Mechanisms– Necessary vs. Sufficient Yield – Ability to mimic false positives and build “immunity” to detection

• Detection Strategy– Must evolve from “detect at point of deployment” to “detect at

place of design and manufacture”– Must “look ahead” to new weapon design engineering, operations

Copyright 2006 TETRAD Technologies Group, Inc.

Page 4: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Lessons from Manila, London et al

• Finding– “Mega-bureaucracy” practices are reinforcing an “ossification”

process that inhibits innovation and variation.– “Plans and plots disrupted in the nick of time” - not a strong

defence but an invitation to keep trying.– “Thinking outside the box” is the enemy’s strength but is a

technique discouraged in various “noveau securité” circles.

• Recommendation– Need for more versatile programs and contracting vehicles.

• Applying “innocent until proven guilty” attitude into “plausible until demonstrated otherwise”

• Mobility and transformability• Unpredictability from the perspective of the enemy

– Need for “gateway intelligence systems” comparable to gateway communications (e.g. Raytheon ACU-1000) that allow for interoperability.

– Need for more than “Yada yada” – Yet Another Device Again

Copyright 2006 TETRAD Technologies Group, Inc.

Martin, 7.jan.10:

This paper and presentation was originally 2005, then reshaped for 2006, and all the big agencies and bureaucracies have done exactly the wrong things, even the opposite of this sound strategy.

Martin, 7.jan.10:

This paper and presentation was originally 2005, then reshaped for 2006, and all the big agencies and bureaucracies have done exactly the wrong things, even the opposite of this sound strategy.

Page 5: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Solutions

• One reconfigurable, easy, cheap, adaptable technology (applying what EE & IT learned long ago)

• Non-intrusive for mass transit, esp. air travel

• Harder (for terrorists) to predict or get-around by coming up with a modified chemistry or biology

• Integrable with Existing Detection and Inspection Systems

Copyright 2006 TETRAD Technologies Group, Inc.

Martin, 7.jan.10:

Like even Obama admits now, and all the smart Old-Guard (retired) NSC and CIA guys are saying, WE HAVE NO SYEM, NO INTEGRATION, just a lot of data collection. This is like being able to cut, split and stack firewood, but have no stove in which to burn it. what happens? You freeze to death.

Martin, 7.jan.10:

Like even Obama admits now, and all the smart Old-Guard (retired) NSC and CIA guys are saying, WE HAVE NO SYEM, NO INTEGRATION, just a lot of data collection. This is like being able to cut, split and stack firewood, but have no stove in which to burn it. what happens? You freeze to death.

Page 6: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Chemical Explosive Biothreat Identification and Tracking

Copyright 2006 TETRAD Technologies Group, Inc.

JEDI (aka “CEBIT”)

AF

123 – LA

X –

1234567-BR

OW

NJ

BatteryMSL

(e.g., 4x4 cell array)

PWRMEM

PROC

DCL

ACT

Martin, 7.jan.10:

This is not imaginary but real and ready for mfgr. and use - the images at left are from working prototypes, from 2005 and earlier!!!

Martin, 7.jan.10:

This is not imaginary but real and ready for mfgr. and use - the images at left are from working prototypes, from 2005 and earlier!!!

Page 7: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

JEDI / CEBIT A solution that (economically, and ergonomically) CAN “cover all bases”

Components:1. An extensible grid (array) of multi-spectral, multi-functional sensor elements – Not Only For Explosives (but that is the Present Focus and Demand).

2. A chip set operating in a card package – self-contained, self-powered, easy, robust, and very inexpensive. 3. A human factors system that is unobtrusive and can increase protection while speeding up the inspection process.

4. Adaptable “engine” to meet future needs (especially “E” and “B” threats) As They Emerge.

5. Aerosol concentrator auxiliary system to handle cases of extremely difficult concentrations due to the nature of the compound or the operating environment.

6. A scalable architecture that can be operated as a network in a number of confined physical environments or expanded to roadside/neighborhood outdoor operations.

Chemical Explosive Biothreat Identification and Tracking

Copyright 2006 TETRAD Technologies Group, Inc.

Page 8: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Copyright 2006 TETRAD Technologies Group, Inc.

JEDI / CEBIT

CHECK-IN

CheckedChecked

CheckedCarry-On

Security (Std)

GATEPRE-LOAD

Security (Std)

ValidationValidation

Activation

Working

Martin, 7.jan.10:

We were told by bureaucrats in DHS, JIEDDO and TSWG in 2005, 2006, 2007 that all this was not necessary because the problem was solved and under control - I kid you not!

Martin, 7.jan.10:

We were told by bureaucrats in DHS, JIEDDO and TSWG in 2005, 2006, 2007 that all this was not necessary because the problem was solved and under control - I kid you not!

Page 9: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

JEDI / CEBIT Analysis based upon predictive, modeling-building order/lattice theory, inverse methods, support vector algorithms, and related nonlinear reasoning models

Reliance upon sensors, Bayesian PR, post-symptomatic reports alone is insufficient

Greatest risk of missing the threat underway is in slow ability to rapidly plan and coordinate response on multiple levels – similar as with biothreats – sensing agents, decon, sampling, diagnosis, treatments

Information Integration must occur at the micro (chip) level

JEDI (CEBIT) learns from what worked and failed in similar system environments

Confirmation and refinement of identified threats, false positives requires improved methods – SVM and IRM (GENET) can provide better discrimination & classification

Coordination of resources, teams, delivery, dissemination, disbursement requires the approach used in CHAIN and COPF

Copyright 2006 TETRAD Technologies Group, Inc.

Chemical Explosive Biothreat Identification and Tracking

Page 10: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Copyright 2006 TETRAD Technologies Group, Inc.

JEDI / CEBIT

Deformable Registration

Mutual Information

Diffusion-Attraction

Page 11: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Copyright 2006 TETRAD Technologies Group, Inc.

JEDI / CEBIT

Hierarchically ordered networks of relations (events)

Page 12: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Copyright 2006 TETRAD Technologies Group, Inc.

JEDI / CEBIT

NOT ONLY for Operation at TARGETS but at SOURCES

Page 13: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

JEDI CONOPS Model – built upon biological foundations

Copyright 2006 TETRAD Technologies Group, Inc.

Chemical Explosive Biothreat Identification and Tracking

Page 14: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Incident (Site) Prediction Example

Detections during span t1,2

Predicted Incidents post-t2IRM Predicted Convergence post-t2

Reported Indicators overlapping t1,2

Copyright 2006 TETRAD Technologies Group, Inc.

Chemical Explosive Biothreat Identification and Tracking

Page 15: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

The GIS components are essential for critical data and interactive human+machine analysis. The missing ingredients are available and readily integrated with the mathematical analytics. With architectures such as Nomad Eyes or Red Cell, the communication gaps can be crossed for data gathering, verification, planning and response.

Copyright 2006 TETRAD Technologies Group, Inc.

Chemical Explosive Biothreat Identification and Tracking

Page 16: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

JEDI / CEBIT IS READY FOR FIELD TESTING AND PROTOTYPING

Actions Required:One Agency that wants to take the lead in protecting their people, their country.

One specific flexible, receptive test environment (real airport, real neighborhood). One firm step forward to enable co-creating the fieldable, working operational system.

One “break” from the monotony of the usual prolonged set of procedures and delays that often are indirectly serving the aims of terrorists.

A few open doors.

A modest budget.

A unified team with the determination to stop those who want to destroy our lives.

NEXT STEPS Needed Now, Not After Another 9-11

Copyright 2006 TETRAD Technologies Group, Inc.

Page 17: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Contacts

Martin Dudziak (Exec Chmn)– (757) 847-5511– (804) 740-0342– (202) 415-7295– [email protected]

– also see http://tetradyn.com/contact.php for more of the business team

TETRADYN (TETRAD Dynamics)28 Chase Gayton Circle, Suite 731Richmond, VA 23238 USA

Page 18: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Copyright © 2006 Martin J. Dudziak, PhD and The S4 Center, Inc.

Coordinated Biothreat Protection and Response System

Backup Material

CUBIT / CBPR as System, Program

Page 19: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Nitrate

Peroxide

Organophosphate

Carbamate

Sulfate

MRSA

VRE

H5N1

TB

Protein marker1

Protein marker2

U-Decide-It

Sense Targets

Page 20: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

MC (Micro-cantilever)

ROB (Resonant Optical)

PLC (Polymer Laminate Catalyst)

Sensing Methods

Page 21: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

CUBIT CONOPS VisionUnified Communications from Every Perspective

Translating Data Visualization & Analysis into concrete “go here, don’t go there” messages

Real-Time Situational Awareness: Decision-makers can get the helicopters and HMMWVs to the victims fast!

Get the Right Information to the Right People for the Purpose of Saving Lives.

Page 22: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

• Verona™ is a field-tested intelligent knowledge management and discovery notebook [1]

• Command-Post-of-the-Future is now in-the-present serving US forces [1]

• CMDRS [1] and other agent-based situation awareness and knowledge discovery components are readily adaptable to Clinical Medicine, Epidemiology, Disease Management and Public Health applications

Coordinated Unified Biothreat Intervention and Tracking

Copyright 2006 TETRAD Technologies Group, Inc.

Page 23: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Intelligent Services Layer (ISL)

CHAINEngine

ChainAPI

MonitorAgents

AnalysisAgents

CMDLine

FatClients

WebClientsV

IEW

CNTL

Intelligent Workflow Management

Implement Plans which Operate on Events & Operator Direction

Communicate Knowledge Across Activities

Execute External Processes Based on Results

Utilizes ISL for Agent Coordination

Monitor, Analysis, Notification- Query Databases, Repositories, Web Pages, & Sensors- Monitor Critical Events Across the Globe- Intelligently Notify Users of Critical Events

MonitorAgents

MonitorAgents

AnalysisAgentsAnalysisAgents

NotificationAgents

Multiple Comm Protocols

- SOAP/HTTP- RMI/IIOP

MonitorAgents

MonitorAgents

ChainAgents

ChainAgents

ChainAgents

CHAIN Overview

Copyright 2006 TETRAD Technologies Group, Inc.

Coordinated Unified Biothreat Intervention and Tracking

Page 24: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

ISL Architecture

Intelligent Services Layer (ISL)

DataWrapper

DataWrapper

DataWrapper

DataWrapper

DataWrapper

DataWrapper

Weather Data

Traffic Data

GeologicalData

Public Services

Coast Guard

Fire/RescueCMDRS Desktop

Law Enforcement

Health Services

National Guard

Master Schedule

Unit Locations

D-COP

Page 25: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Knowledge Organizer

Analyst PortalLe Monde

Al Jazeera

Ettelaat

Translation

Concept Analysis

Visualization

GISIntelligent Agents

Search Agents

Link Analysis

Person…OrganizationLocationKeyword Search Clear

Search>>and

or

not

Reset Save as Search Agent

Federated Search

LumINT: Knowledge Discovery

Agent and Service basedIntegration Framework

Best of Breeds COTS

Page 26: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

GoogleSearch

Mediator QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

YahooNews

Mediator

LumINT Information Flow

KStore

WorkflowController

Agent

LumINTJ2EE

WebApps

ToolDiscovery

Service

CHAINAgents

VerityFederated

Search DocumentCollection

Indexes

ChiliadSearch

ConceptAnalysisEngine

ConceptDatabase

VeronaNotebook

Page 27: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010
Page 28: Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

Grid Enabled Integration Framework - Plug-and Play of ALL components

Security Guard - (e.g. ISSE Guard, Radiant Mercury, InfoPump)

Information Sharing Policy Manager - Per-agency or per-analyst

** Knowledge RepresentationMediator (e.g. OWL, KIF, CL, OKBC)

Core Services and AgentsCommon Infrastructure Components

Analyst ActivityLogger

*** CASE Web Services and Agents Components

Workflow ManagerPortal - Distributed Collaborative Content Sharing

CASE Evaluation ToolsQuantitative Analysis

*** CASE Applications GUICommon Look and Feel

Documents

RDBMS

*** AdvancedVisualizations

Message Streams

WWWKnowledge

RepositoriesLogger

Repository