18
Technologies for Homeland Security Contact: Brijesh kumar, Ph.D. Rapidsoft Systems Inc. Princeton, NJ 08550 +1 609-439-4775 [email protected] 1

July2013presentation rev1

Embed Size (px)

DESCRIPTION

Rapidsoft Systems (http:///www.rapidsoftsystems.com) is a leading outsourced software development, and IT service company based in NJ with offices in the US, India and Middle East. In the last 10 years, our team has produced over 400+ successful projects including numerous prestigious mobile and web apps for big corporations. Rapidsoft Systemd also offers Defentect, an integrated advanced system for Detecting Chemical, Biological, Radiological, Nuclear and Explosive (CBRNE) Threats proactively. This sensor based system can provide pro-active threat detection from terrorists and save lives. This presentation provides some information about Defentect CBRNE safety System. If you are looking for security and safety of homelan, contact us at +1 609 439 4775 for more information.

Citation preview

  • 1. Technologies for Homeland Security Contact: Brijesh kumar, Ph.D. Rapidsoft Systems Inc. Princeton, NJ 08550 +1 609-439-4775 [email protected] 1
  • 2. CURRENT SITUATION Many types of threats Chemical, Biological, Radiological, Nuclear, Explosive (CBRNE) Domestic/External origin Many delivery systems More sophistication Materials readily available The risk of a terrorist acquiring and using a nuclear or radiological device is one of the greatest threats to the nation 2
  • 3. CHALLENGE Detect multiple threats Maximize technology Minimize human error Very manageable Robust, layered defense to reduce terrorists capabilities Provide critical information during first 72 hours of event to first responders Provide event/post-event forensic analysis 3 KEEP US SAFE
  • 4. Addressing head-on the low cost manpower issue: No reason for a rapidly growing country to replicate the historical technologies and institutional bureaucracies that older countries used as they developed. 4
  • 5. The risks: The roving guard isn't there when the terrorist races across the railroad platform. The guard is bored and inattentive because it is the 7th hour of his shift. He was bribed by what he thought were run-of-the-mill smugglers to look the other way but who turned out to be terrorists, as happened in Russia. Or, as in Afghanistan, the guard himself is a terrorist who has infiltrated the security organization. Traditional security: armed guards patrolling a perimeter, peering into darkness, checking IDs
  • 6. Even if the policeman is conscientious and alert: Does he have the training to know what to do when he's out on patrol? The instantaneous right reaction? Is security dependent upon the individual decisions made under stress by scores of security guards on patrol?
  • 7. 7 Whats Wrong With Current Chemical/Biological/Radiological/Nuclear/Explosive/Visual/ Motion/Detection Systems? Labor intensive and expensive Require security guards to focus over protracted time periods and respond manually Delayed alerts to authorities High incidence of innocent and false positive alarms How well trained in physics or chemistry are security personnel manning the computer screens? Does an 8 hour shift affect judgment? How will on-site information, critical during the first 72 hours of a crisis event, be provided? How will forensic analysis be conducted during and immediately after the event?
  • 8. 8 Department of Homeland Security: Complete Defense Spectrum
  • 9. 9 The Solution Intelligent threat networks that monitor chemical, biological, radiological, nuclear, and explosives sensors; visual analytics and motion detectors can reduce or eliminate misdiagnosis and false positives Intelligent threat networks can provide early alert of a threat. Intelligent threat networks can continue to provide information to first responders during the critical initial 72 hours of a crisis. Intelligent threat networks can provide immediate forensic analysis during and after a crisis event. Defentects DM3 software is the management, monitoring and messaging component that networks to third party sensors, providing administrative and configuration services for a variety of threat-event detection demands. Defentect has unique, low cost, integrated, networked, ubiquitous, wide area, unmanned software architecture and sensor technologies that meet this need. Our intellectual property is built upon readily available electro-optical devices. Defentects products graft readily onto existing security systems, minimizing adoption costs and facilitating widespread distribution.
  • 10. Defentect DM3 Proven threat awareness solution Developed under Chairman Paul Bremer, Ambassador-at-Large for Counterterrorism and U.S. Administrator of Coalition Provisional Authority in Iraq. Installed, operational and proven in high value target facilities in the US. Gathers data from virtually any sensor which can live on a data network. Seeks and identifies anomalies in the data. Forwards the new information to an unlimited number of devices on any platform capable of receiving messages: SMS, email, smartphones, voicemail, XML. Automatically forwards any digitized informationsuch as floor plans and the names and photographs of authorized personnelto first responders. All instantaneously and independent of operating personnel. 10
  • 11. 11 Pilots & Disaster Response Training Exercises Participant in Operation Golden Phoenix Federal terrorism response laboratory, San Diego, with U.S. Department of Homeland Security Customs and Border Protection, U.S. Marine Corps Aircraft Group 46, DOD, DEA, FBI, DOJ, DOE At Golden Phoenix, Defentect monitored threat-level radiation at Brown Field Airport and Scripps Memorial Hospital La Jolla Among installations: AIT Worldwide Logistics, Itasca, IL, a global transportation provider Bethesda Medical Center, premier Washington Hospital Center for all senior civilian/military in D.C.
  • 12. 12
  • 13. Defentect DM3 Precise and Predictable Security Independent of Personnel Examples of what DM3 can do: DM3 can automatically cause video cameras to rotate to cover an entrance when a radiological threat is detected at that entrance without the need for human action. DM3 can add sensors as easily as clicking on a website for instantaneous and continually changing security. DM3 is capable of pulling up data from computer data banks so that when DM3 delivers the pre-specified warning message, data from the data storage banks can be sent along as well 13
  • 14. INSTALLER RESPONSIBILITIES Train the Channel Product Market Business Opportunity Support the Channel Inside and Outside Sales Engineering Network guidance Continue Region-Specific Product Improvement 14
  • 15. DEFENTECT DIFFERENCE IP-based alert sensors at commercial prices. IP-based interface to legacy systems Web-based management, monitoring, and messaging system Commercial distribution channel. Operational, now Wisdom of our advisors 15
  • 16. Department of Homeland Security: Desired End State Port-centric detection strategy Passive detection systems Fixed architecture Federal efforts Locally operated detectors U.S. focused strategy Targeted scanning Primarily rad/nuc detection Multi-layered detection strategy Integrated passive/active systems Fixed/mobile/relocatable architecture Federal/State/local efforts Networked detectors Global interconnected strategy Comprehensive scanning All signatures detection CURRENT FUTURE A fundamental change in the way the United States counters radiological and nuclear trafficking.
  • 17. Defentect DM3 Precise, uniform, predictable response without relying upon personnel training or loyalty. Trained personnel out in the field patrolling, not sitting in a darkened room looking at a computer screen. Elimination of variable response from different security personnel. 17
  • 18. 18 Contact: Dr. Brijesh Kumar, CSO/COO Rapidsoft Systems Inc. Princeton, NJ 08550 +1 609 439 4775 [email protected]