july2013presentation cbrn system
DESCRIPTION
Rapidsoft Systems (http:///www.rapidsoftsystems.com) is a leading outsourced software development, and IT service company based in NJ with offices in the US, India and Middle East. In the last 10 years, our team has produced over 400+ successful projects including numerous prestigious mobile and web apps for big corporations. Rapidsoft Systemd also offers Defentect, an integrated advanced system for Detecting Chemical, Biological, Radiological, Nuclear and Explosive (CBRNE) Threats proactively. This sensor based system can provide pro-active threat detection from terrorists and save lives. This presentation provides some information about Defentect CBRNE safety System. If you are looking for security and safety of homelan, contact us at +1 609 439 4775 for more information.TRANSCRIPT
Technologies for Homeland Security
Contact: Dr. Brijesh kumar
CSO/COO Rapidsoft Systems Inc.
Princeton, NJ 08550
+1 609-439-4775
1
CURRENT SITUATION
• Many types of threats
Chemical, Biological, Radiological, Nuclear, Explosive
(CBRNE)
• Domestic/External origin
• Many delivery systems
• More sophistication
• Materials readily available
The risk of a terrorist acquiring and using a nuclear or
radiological device is one of the greatest threats to the
nation
2
CHALLENGE
• Detect multiple threats
• Maximize technology
• Minimize human error
• Very manageable
• Robust, layered defense to reduce terrorist’s
capabilities
• Provide critical information during first 72
hours of event to first responders
• Provide event/post-event forensic analysis
3 KEEP US SAFE
Addressing head-on the low cost
“manpower” issue:
No reason for a rapidly growing country to
replicate the historical technologies and
institutional bureaucracies that older
countries used as they developed.
4
The risks:
The roving guard isn't there when the terrorist races across the railroad platform.
The guard is bored and inattentive because it is the 7th hour of his shift.
He was bribed by what he thought were run-of-the-mill smugglers to look the other way but who turned out to be terrorists, as happened in Russia.
Or, as in Afghanistan, the guard himself is a terrorist who has infiltrated the security organization.
Traditional security: armed guards patrolling
a perimeter, peering into darkness, checking
ID’s
Even if the policeman is
conscientious and alert:
Does he have the training to know what to do when he's out on patrol?
The instantaneous right reaction?
Is security dependent upon the individual decisions made under stress by scores of security guards on patrol?
7
What’s Wrong With Current
Chemical/Biological/Radiological/Nuclear/Explosive/Visual/
Motion/Detection Systems?
• Labor intensive and expensive
• Require security guards to focus over protracted time
periods and respond manually
• Delayed alerts to authorities
• High incidence of innocent and false positive alarms
• How well trained in physics or chemistry are security
personnel manning the computer screens? Does an
8 hour shift affect judgment?
• How will on-site information, critical during the first 72
hours of a crisis event, be provided?
• How will forensic analysis be conducted during and
immediately after the event?
8
Department of Homeland Security:
Complete Defense Spectrum
9
The Solution
• Intelligent threat networks that monitor chemical, biological, radiological, nuclear, and explosives sensors; visual analytics and motion detectors can reduce or eliminate misdiagnosis and “false positives”
• Intelligent threat networks can provide early alert of a threat.
• Intelligent threat networks can continue to provide information to first responders during the critical initial 72 hours of a crisis.
• Intelligent threat networks can provide immediate forensic analysis during and after a crisis event.
• Defentect’s DM3™ software is the management, monitoring and messaging component that networks to third party sensors, providing administrative and configuration services for a variety of threat-event detection demands.
• Defentect has unique, low cost, integrated, networked, ubiquitous, wide area, unmanned software architecture and sensor technologies that meet this need.
• Our intellectual property is built upon readily available electro-optical devices.
• Defentect’s products graft readily onto existing security systems, minimizing adoption costs and facilitating widespread distribution.
Defentect DM3
Proven threat awareness solution
• Developed under Chairman Paul Bremer, Ambassador-at-Large for
Counterterrorism and U.S. Administrator of Coalition Provisional
Authority in Iraq.
• Installed, operational and proven in “high value” target facilities in
the US.
• Gathers data from virtually any sensor which can live on a data
network.
• Seeks and identifies anomalies in the data.
• Forwards the new information to an unlimited number of devices on
any platform capable of receiving messages: SMS, email,
smartphones, voicemail, XML.
• Automatically forwards any digitized information—such as floor
plans and the names and photographs of authorized personnel—to
first responders.
• All instantaneously and independent of operating personnel.
10
11
Pilots & Disaster Response Training Exercises
• Participant in Operation Golden Phoenix Federal terrorism response laboratory, San Diego, with U.S. Department of Homeland Security Customs and Border Protection, U.S. Marine Corps Aircraft Group 46, DOD, DEA, FBI, DOJ, DOE
• At Golden Phoenix, Defentect monitored threat-level radiation at Brown Field Airport and Scripps Memorial Hospital La Jolla
Among installations:
• AIT Worldwide Logistics, Itasca, IL, a global transportation provider
• Bethesda Medical Center, premier Washington Hospital Center for all senior civilian/military in D.C.
12
Defentect DM3
Precise and Predictable Security Independent of Personnel
Examples of what DM3 can do: • DM3 can automatically cause video cameras to
rotate to cover an entrance when a radiological threat
is detected at that entrance without the need for
human action.
• DM3 can add sensors as easily as clicking on a
website for instantaneous and continually changing
security.
• DM3 is capable of pulling up data from computer data
banks so that when DM3 delivers the pre-specified
warning message, data from the data storage banks
can be sent along as well
13
INSTALLER RESPONSIBILITIES
• Train the Channel
– Product
– Market
– Business Opportunity
• Support the Channel
– Inside and Outside Sales
– Engineering
– Network guidance
• Continue Region-Specific Product Improvement
14
DEFENTECT DIFFERENCE
• IP-based alert sensors at commercial
prices.
• IP-based interface to legacy systems
• Web-based management, monitoring,
and messaging system
• Commercial distribution channel.
• Operational, now
• Wisdom of our advisors
15
Department of Homeland Security:
Desired End State
Port-centric detection strategy
Passive detection systems
Fixed architecture
Federal efforts
Locally operated detectors
U.S. focused strategy
Targeted scanning
Primarily rad/nuc detection
Multi-layered detection strategy
Integrated passive/active systems
Fixed/mobile/relocatable architecture
Federal/State/local efforts
Networked detectors
Global interconnected strategy
Comprehensive scanning
All signatures detection
CURRENT FUTURE
A fundamental change in the way the United States counters
radiological and nuclear trafficking.
Defentect DM3
• Precise, uniform, predictable response
without relying upon personnel training or
loyalty.
• Trained personnel out in the field patrolling,
not sitting in a darkened room looking at a
computer screen.
• Elimination of variable response from
different security personnel. 17
18
Contact:
Dr. Brijesh Kumar,
CSO/COO
Rapidsoft Systems Inc.
Princeton, NJ 08550
+1 609 439 4775