SlideShare a Scribd company logo
1 of 17
Download to read offline
Technologies for Homeland Security
- Advanced CBRN Threat Detection System
Contact: Brijesh Kumar, Ph.D.
CSO/COO
Rapidsoft Systems Inc.
Princeton, NJ 08550
Direct Line: +1 609 -439 -4775
bkumar@rapidsoftsystems.com
Defentect

• Our Mission
– the discovery and deployment of
advanced technologies for physical and
homeland security
– Intelligent Threat Awareness
NUCLEAR AND RADIOLOGICAL TERRORISM THREATS
FOR INDIA:
RISK POTENTIAL AND COUNTERMEASURES
by
Rajesh M. Basrur, Director, Centre for Global Studies, Mumbai ;
Friedrich Steinhäusler, Professor, Institute of Physics and Biophysics,
University of Salzburg, Austria

•This report by two learned scholars in the field
describes quite well the threats that India faces.

•We will use this report to specify precisely where
the Defentect Team can aid India
From the Report, page 2. Section 2.1 Radiological Terrorism. “It
is questionable whether initially Indian authorities would even
be aware of the fact that a terror act..has occurred, since
most first responders are neither trained, nor technically
equipped to detect..”
Defentect can deploy to First Responders inexpensive mobile
radiological sensors, like those currently used in New York City.
The individual First Responder need NOT read the sensor. DM3
sensor analytics software can detect the pattern of radiological
dispersion and determine the extent and lethality of any radiation
exposure.
Authoritative announcements from the government setting out
with accuracy the limits of the radiological exposure will
eliminate panic far more effectively than any propaganda.
Sensors can continue to provide information during the critical 72
hours of a crisis.
Page 3. Section 2.2 Terrorist attacks on the nuclear infrastructure in
India. “A small team of trained saboteurs gains access to

a nuclear power plant, possibly with an insider’s
assistance…”
The advantage of Perimeter Security Information
Management (“PSIM”):
•Combined with sensors, closed-circuit television, fiber-optic
cable motion detectors, sensor analytics and video analytics,
•Eliminates the uncertainty of relying on the awareness,
training, and loyalty of any individual security guard.
•Established procedures and notifications, well-thought out in
advance, can be assured of being implemented through
PSIM.
Page 5 Section 3.1 Illegal Acquisition of Nuclear and Other Radioactive
Material from India and Abroad. “There are multiple possibilities for
terrorists to obtain radioactive material in India suitable for an
Radiological Dispersal Device, such as hospitals..;research
facilities..; oil-and-gas explorations industry; road construction
industry; and steel manufacture…over 10,000 [locations]...”
“Typically, physical protection at these sites is rather lax, at best
comparable to the protection provided at a jeweler shop, i.e., not a
real logistical problem for a trained team of adversaries.”

•India’s Atomic Energy Commission (AEC) should assume total
control of monitoring all radiological material at the borders and
within the country, legal and outlaw, not just to protect "targets".
•Every single square inch of the country is NOT at risk and does
NOT have to be sensored.
•The number of targets are manageable and the number of
legitimate sources are limited.
•Sensors can be inexpensively deployed at every licensed site.
Page 7. Section 3.2 India’s Nuclear Power Infrastructure.
Page 7. Section 3.3 Organizational Vulnerabilities. “A serious

potential threat to nuclear facilities..comes from
insiders.”

Again, PSIM automates the response and
lessens reliance on human training, loyalty, and
awareness.
What is to be done to protect the Nation?

.
• From the IAEA: “a cardinal rule of radiological protection,
namely that the security of the source is of paramount
importance.”
• Our view is that a central agency should set standards and
custodial responsibilities for radioactive materials, assume
total control of monitoring all radiological material at the
borders and within the country, legal and outlaw, not just to
protect "targets".
• Security is a matter of taking control of the locations of likely
activity - both sources of dangerous materials and locations
which are considered targets. It is not necessary to cover
every inch of the country with detectors to provide an effective
overall system
The Solution
• Intelligent threat networks that monitor movement can reduce or
eliminate misappropriation.

• Defentect’s DM3™ software is the only management, monitoring
and messaging component that networks to any third party
sensors, providing administrative and configuration services for
a variety of threat-event detection demands.
• Defentect has unique, low cost, integrated, networked,
ubiquitous, wide area, unmanned software architecture and
sensor technologies that meet this need.
• Our intellectual property is built upon readily available electrooptical devices.
• Defentect’s products graft readily onto existing security systems,
minimizing adoption costs and facilitating market penetration.
9
Defentect DM3

Proven threat awareness solution

• Developed under Chairman Paul Bremer, Ambassador-at-Large for
Counterterrorism and U.S. Administrator of Coalition Provisional
Authority in Iraq.
• Installed, operational and proven in “high value” target facilities in
the US.
• Gathers data from virtually any sensor which can live on a data
network.
• Seeks and identifies anomalies in the data.
• Forwards the new information to an unlimited number of devices on
any platform capable of receiving messages: SMS, email,
smartphones, voicemail, XML.
• Automatically forwards any digitized information—such as floor
plans and the names and photographs of authorized personnel—to
first responders.
• All instantaneously and independent of operating personnel.
• Continuous information delivered during the first 72 hours of an
10
attack—without relying on First Responders.
PROVEN IN THE US
• Participant in Operation Golden Phoenix Federal terrorism
response laboratory, San Diego, with :
–
–
–
–
–
–
–
–

U.S. Department of Homeland Security
Customs and Border Protection,
U.S. Marine Corps Aircraft Group 46,
Department of Defense
Drug Enforcement Agency
Federal Bureau of Investigation
Department of Justice,
Department of Energy

• At Golden Phoenix, Defentect monitored threat-level
radiation at Brown Field Airport and Scripps Memorial
Hospital La Jolla
Among US installations:
• AIT Worldwide Logistics, a global transportation provider
• Walter Reed National Military Medical Center,premier
Washington D.C. are Hospital Center for all senior
11
civilian/military.
Defentect Difference

• IP-based interface to legacy systems
• Web-based management, monitoring,
and messaging system
• IP-based sensors at commercial prices
• Commercial distribution channel
• Existing pilots in operation
• Wisdom of our advisors
DELIVERY OF THE TOTAL SECURITY PACKAGE
IDENTIFICATION/ASSESSMENT OF THREATS
DESIGN THE SYSTEM
DESIGN APPROPRIATE RESPONSE FOR ALARM
SELECT APPROPRIATE SENSORS
PURCHASE THE EQUIPMENT
INSTALLATION OF THE SYSTEM

TRAINING FOR THE USE OF THE SYSTEM
TRAINING RAPID RESPONSE TEAM:
14
DELIVERY OF THE TOTAL SECURITY PACKAGE
1.

2.
3.

4.

5.

6.
7.
8.

IDENTIFICATION/ASSESSMENT OF THREATS: The Defentect Team will identify and assess the
threats at each location that is specified. As this will be time-consuming and require site visits, travel
costs and other out of pocket expenses, and subject matter experts (“SME’s”) charging a reasonable
hourly rate to develop the plan, payment in advance of the estimated expenses plus half of the
remaining cost to develop the plan. The Team will present the plan in an oral presentation. The
remaining amount will be payable and due upon receipt of the written report, including any slides, of
the Identification/Assessment of Threats.
DESIGN THE SYSTEM: The Team will design the layout and sensor/CCTV/detector locations for
each site specified. The amount will be payable upon delivery of the written report.
DESIGN THE APPROPRIATE RESPONSE FOR ALARM: The Team will design the appropriate
response, including who should be alerted and what messages should be sent out. The cost of
designing the appropriate response and notification scheme will be due and payable upon delivery of
the written report.
SELECT APPROPRIATE SENSORS: The Team, working with relevant vendors, will select the
appropriate sensors/video analytics/CCTV/motion detectors. This cost will included into the total cost
of purchasing the equipment from manufacturers and video analytics software developers.
PURCHASE THE EQUIPMENT. The Team will purchase the equipment upon receipt of the full
purchase price in advance..
INSTALLATION OF THE SYSTEM: The Team will be responsible for the installation. Staged
advance payments will be required.
TRAINING FOR THE USE OF THE SYSTEM: This should take no more than one week’s time and
will be built into the cost of installation .
TRAINING RAPID RESPONSE TEAM: This will be the responsibility of the Defentect Team , which
will include options for Mobile Training Teams at the customer’s training facility or training in the US.
Payable in full in advance before any training can take effect.
15
Next step: meeting to discuss the scope
of work, detailed analysis of security, pricing
IDENTIFICATION/ASSESSMENT OF THREATS
DESIGN THE SYSTEM
DESIGN APPROPRIATE RESPONSE FOR ALARM
SELECT APPROPRIATE SENSORS
PURCHASE THE EQUIPMENT
INSTALLATION OF THE SYSTEM

TRAINING FOR THE USE OF THE SYSTEM
TRAINING RAPID RESPONSE TEAM:
16
Contact Information
Primary Contact:

Brijesh Kumar, Ph.D.
CSO/COO
bkumar@rapidsoftsystems.com
Rapidsoft Systems Inc.
Princeton, NJ 08550
Phone: +1 609-439-4775

More Related Content

What's hot

The TTPs of hard hat incident response
The TTPs of hard hat incident responseThe TTPs of hard hat incident response
The TTPs of hard hat incident responseHinne Hettema
 
Research of Intrusion Preventio System based on Snort
Research of Intrusion Preventio System based on SnortResearch of Intrusion Preventio System based on Snort
Research of Intrusion Preventio System based on SnortFrancis Yang
 
Global Ransomware Client Alert
Global Ransomware Client AlertGlobal Ransomware Client Alert
Global Ransomware Client AlertRobyn Melnyk
 
Global ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sgGlobal ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sgChristopher R. Ward
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsLumension
 
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - HowardBirds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - HowardHITCON GIRLS
 
amrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdfamrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdfamrapalibuildersreviews
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationShritam Bhowmick
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteDamir Delija
 
Cybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCCybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCFidelis Cybersecurity
 
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...Muhammad FAHAD
 
201408 fire eye korea user event press roundtable
201408 fire eye korea user event   press roundtable201408 fire eye korea user event   press roundtable
201408 fire eye korea user event press roundtableJunSeok Seo
 
NFA Interpretive Notice on Info Security
NFA Interpretive Notice on Info SecurityNFA Interpretive Notice on Info Security
NFA Interpretive Notice on Info SecurityWesley Moore
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsFidelis Cybersecurity
 
Information security-toolkit-76396-8
Information security-toolkit-76396-8Information security-toolkit-76396-8
Information security-toolkit-76396-8colleenatrsc
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat managementRajendra Menon
 

What's hot (18)

The TTPs of hard hat incident response
The TTPs of hard hat incident responseThe TTPs of hard hat incident response
The TTPs of hard hat incident response
 
Research of Intrusion Preventio System based on Snort
Research of Intrusion Preventio System based on SnortResearch of Intrusion Preventio System based on Snort
Research of Intrusion Preventio System based on Snort
 
Global Ransomware Client Alert
Global Ransomware Client AlertGlobal Ransomware Client Alert
Global Ransomware Client Alert
 
Global ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sgGlobal ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sg
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
 
Ht r32
Ht r32Ht r32
Ht r32
 
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - HowardBirds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
 
amrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdfamrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdf
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
 
Cybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCCybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOC
 
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
 
ICS CERT- Incidence Reports
ICS CERT- Incidence ReportsICS CERT- Incidence Reports
ICS CERT- Incidence Reports
 
201408 fire eye korea user event press roundtable
201408 fire eye korea user event   press roundtable201408 fire eye korea user event   press roundtable
201408 fire eye korea user event press roundtable
 
NFA Interpretive Notice on Info Security
NFA Interpretive Notice on Info SecurityNFA Interpretive Notice on Info Security
NFA Interpretive Notice on Info Security
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Information security-toolkit-76396-8
Information security-toolkit-76396-8Information security-toolkit-76396-8
Information security-toolkit-76396-8
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 

Viewers also liked

Dr. James A. Roth - Evolution of Biosecurity – Recommendations for the Secure...
Dr. James A. Roth - Evolution of Biosecurity – Recommendations for the Secure...Dr. James A. Roth - Evolution of Biosecurity – Recommendations for the Secure...
Dr. James A. Roth - Evolution of Biosecurity – Recommendations for the Secure...John Blue
 
Africa, the infectious continent With global warming, Africa is challenged by...
Africa, the infectious continent With global warming, Africa is challenged by...Africa, the infectious continent With global warming, Africa is challenged by...
Africa, the infectious continent With global warming, Africa is challenged by...Healthcare consultant
 
Saab CBRN at IDEX 2015
Saab CBRN at IDEX 2015Saab CBRN at IDEX 2015
Saab CBRN at IDEX 2015Saab AB
 
CBRN mobile lab in Italy-presentation
CBRN mobile lab in Italy-presentationCBRN mobile lab in Italy-presentation
CBRN mobile lab in Italy-presentationGiorgio Mari
 
The cbrn defense market 2013 2023 - Reports Corner
The cbrn defense market 2013 2023 - Reports CornerThe cbrn defense market 2013 2023 - Reports Corner
The cbrn defense market 2013 2023 - Reports CornerReports Corner
 
Biological disaster management
Biological disaster managementBiological disaster management
Biological disaster managementNaveen S
 
Biosafety in the laboratories
Biosafety in the laboratoriesBiosafety in the laboratories
Biosafety in the laboratoriesVAIBHAV RAJHANS
 

Viewers also liked (15)

More effective surveillance design for horticulture biosecurity threats
More effective surveillance design for horticulture biosecurity threatsMore effective surveillance design for horticulture biosecurity threats
More effective surveillance design for horticulture biosecurity threats
 
Dr. James A. Roth - Evolution of Biosecurity – Recommendations for the Secure...
Dr. James A. Roth - Evolution of Biosecurity – Recommendations for the Secure...Dr. James A. Roth - Evolution of Biosecurity – Recommendations for the Secure...
Dr. James A. Roth - Evolution of Biosecurity – Recommendations for the Secure...
 
Australia bio terrorism_overview
Australia bio terrorism_overviewAustralia bio terrorism_overview
Australia bio terrorism_overview
 
Africa, the infectious continent With global warming, Africa is challenged by...
Africa, the infectious continent With global warming, Africa is challenged by...Africa, the infectious continent With global warming, Africa is challenged by...
Africa, the infectious continent With global warming, Africa is challenged by...
 
Session 1: Strengthening border biosecurity Improving - Post Entry Quarantine...
Session 1: Strengthening border biosecurity Improving - Post Entry Quarantine...Session 1: Strengthening border biosecurity Improving - Post Entry Quarantine...
Session 1: Strengthening border biosecurity Improving - Post Entry Quarantine...
 
Saab CBRN at IDEX 2015
Saab CBRN at IDEX 2015Saab CBRN at IDEX 2015
Saab CBRN at IDEX 2015
 
CBRN mobile lab in Italy-presentation
CBRN mobile lab in Italy-presentationCBRN mobile lab in Italy-presentation
CBRN mobile lab in Italy-presentation
 
Session 6: Building collaboration in biosecurity innovation systems
Session 6: Building collaboration in biosecurity innovation systemsSession 6: Building collaboration in biosecurity innovation systems
Session 6: Building collaboration in biosecurity innovation systems
 
Science Exchange keynote: Plant biosecurity, Sally Troy
Science Exchange keynote: Plant biosecurity, Sally TroyScience Exchange keynote: Plant biosecurity, Sally Troy
Science Exchange keynote: Plant biosecurity, Sally Troy
 
The cbrn defense market 2013 2023 - Reports Corner
The cbrn defense market 2013 2023 - Reports CornerThe cbrn defense market 2013 2023 - Reports Corner
The cbrn defense market 2013 2023 - Reports Corner
 
#isss2016 Berlin - Kaufmann - Requirement Analysis on a virtual reality train...
#isss2016 Berlin - Kaufmann - Requirement Analysis on a virtual reality train...#isss2016 Berlin - Kaufmann - Requirement Analysis on a virtual reality train...
#isss2016 Berlin - Kaufmann - Requirement Analysis on a virtual reality train...
 
Effect of CBRN Incidents on Responders
Effect of CBRN Incidents on RespondersEffect of CBRN Incidents on Responders
Effect of CBRN Incidents on Responders
 
Insect surveillance and eradication
Insect surveillance and eradicationInsect surveillance and eradication
Insect surveillance and eradication
 
Biological disaster management
Biological disaster managementBiological disaster management
Biological disaster management
 
Biosafety in the laboratories
Biosafety in the laboratoriesBiosafety in the laboratories
Biosafety in the laboratories
 

Similar to Defentect cbrn threat_detection system

TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017Riaan Bellingan
 
Safeguarding the Skies: How to Detect Drones in the Air?
Safeguarding the Skies: How to Detect Drones in the Air?Safeguarding the Skies: How to Detect Drones in the Air?
Safeguarding the Skies: How to Detect Drones in the Air?NovoQuad
 
IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityAdlan Hussain
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakMarc St-Pierre
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopDigit Oktavianto
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveDawn Nash Pfeiffer
 
Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Chris Sistrunk
 
NCC Group Pro-active Breach Discovery: Network Threat Assessment
NCC Group Pro-active Breach Discovery: Network Threat AssessmentNCC Group Pro-active Breach Discovery: Network Threat Assessment
NCC Group Pro-active Breach Discovery: Network Threat AssessmentOllie Whitehouse
 
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Sandeep Kumar
 
ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx
ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docxScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx
ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docxronnasleightholm
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical DevicesSuresh Mandava
 
pres_drone_forensics_program.pptx
pres_drone_forensics_program.pptxpres_drone_forensics_program.pptx
pres_drone_forensics_program.pptxVolgaTC
 
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsVulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsRoger Johnston
 

Similar to Defentect cbrn threat_detection system (20)

403 10
403 10403 10
403 10
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Safeguarding the Skies: How to Detect Drones in the Air?
Safeguarding the Skies: How to Detect Drones in the Air?Safeguarding the Skies: How to Detect Drones in the Air?
Safeguarding the Skies: How to Detect Drones in the Air?
 
IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port Security
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
ASISwhitepaper[2]
ASISwhitepaper[2]ASISwhitepaper[2]
ASISwhitepaper[2]
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
 
Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023
 
NCC Group Pro-active Breach Discovery: Network Threat Assessment
NCC Group Pro-active Breach Discovery: Network Threat AssessmentNCC Group Pro-active Breach Discovery: Network Threat Assessment
NCC Group Pro-active Breach Discovery: Network Threat Assessment
 
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
 
ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx
ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docxScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx
ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
 
SecurityOperations
SecurityOperationsSecurityOperations
SecurityOperations
 
pres_drone_forensics_program.pptx
pres_drone_forensics_program.pptxpres_drone_forensics_program.pptx
pres_drone_forensics_program.pptx
 
Lesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPSLesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPS
 
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsVulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Defentect cbrn threat_detection system

  • 1. Technologies for Homeland Security - Advanced CBRN Threat Detection System Contact: Brijesh Kumar, Ph.D. CSO/COO Rapidsoft Systems Inc. Princeton, NJ 08550 Direct Line: +1 609 -439 -4775 bkumar@rapidsoftsystems.com
  • 2. Defentect • Our Mission – the discovery and deployment of advanced technologies for physical and homeland security – Intelligent Threat Awareness
  • 3. NUCLEAR AND RADIOLOGICAL TERRORISM THREATS FOR INDIA: RISK POTENTIAL AND COUNTERMEASURES by Rajesh M. Basrur, Director, Centre for Global Studies, Mumbai ; Friedrich Steinhäusler, Professor, Institute of Physics and Biophysics, University of Salzburg, Austria •This report by two learned scholars in the field describes quite well the threats that India faces. •We will use this report to specify precisely where the Defentect Team can aid India
  • 4. From the Report, page 2. Section 2.1 Radiological Terrorism. “It is questionable whether initially Indian authorities would even be aware of the fact that a terror act..has occurred, since most first responders are neither trained, nor technically equipped to detect..” Defentect can deploy to First Responders inexpensive mobile radiological sensors, like those currently used in New York City. The individual First Responder need NOT read the sensor. DM3 sensor analytics software can detect the pattern of radiological dispersion and determine the extent and lethality of any radiation exposure. Authoritative announcements from the government setting out with accuracy the limits of the radiological exposure will eliminate panic far more effectively than any propaganda. Sensors can continue to provide information during the critical 72 hours of a crisis.
  • 5. Page 3. Section 2.2 Terrorist attacks on the nuclear infrastructure in India. “A small team of trained saboteurs gains access to a nuclear power plant, possibly with an insider’s assistance…” The advantage of Perimeter Security Information Management (“PSIM”): •Combined with sensors, closed-circuit television, fiber-optic cable motion detectors, sensor analytics and video analytics, •Eliminates the uncertainty of relying on the awareness, training, and loyalty of any individual security guard. •Established procedures and notifications, well-thought out in advance, can be assured of being implemented through PSIM.
  • 6. Page 5 Section 3.1 Illegal Acquisition of Nuclear and Other Radioactive Material from India and Abroad. “There are multiple possibilities for terrorists to obtain radioactive material in India suitable for an Radiological Dispersal Device, such as hospitals..;research facilities..; oil-and-gas explorations industry; road construction industry; and steel manufacture…over 10,000 [locations]...” “Typically, physical protection at these sites is rather lax, at best comparable to the protection provided at a jeweler shop, i.e., not a real logistical problem for a trained team of adversaries.” •India’s Atomic Energy Commission (AEC) should assume total control of monitoring all radiological material at the borders and within the country, legal and outlaw, not just to protect "targets". •Every single square inch of the country is NOT at risk and does NOT have to be sensored. •The number of targets are manageable and the number of legitimate sources are limited. •Sensors can be inexpensively deployed at every licensed site.
  • 7. Page 7. Section 3.2 India’s Nuclear Power Infrastructure. Page 7. Section 3.3 Organizational Vulnerabilities. “A serious potential threat to nuclear facilities..comes from insiders.” Again, PSIM automates the response and lessens reliance on human training, loyalty, and awareness.
  • 8. What is to be done to protect the Nation? . • From the IAEA: “a cardinal rule of radiological protection, namely that the security of the source is of paramount importance.” • Our view is that a central agency should set standards and custodial responsibilities for radioactive materials, assume total control of monitoring all radiological material at the borders and within the country, legal and outlaw, not just to protect "targets". • Security is a matter of taking control of the locations of likely activity - both sources of dangerous materials and locations which are considered targets. It is not necessary to cover every inch of the country with detectors to provide an effective overall system
  • 9. The Solution • Intelligent threat networks that monitor movement can reduce or eliminate misappropriation. • Defentect’s DM3™ software is the only management, monitoring and messaging component that networks to any third party sensors, providing administrative and configuration services for a variety of threat-event detection demands. • Defentect has unique, low cost, integrated, networked, ubiquitous, wide area, unmanned software architecture and sensor technologies that meet this need. • Our intellectual property is built upon readily available electrooptical devices. • Defentect’s products graft readily onto existing security systems, minimizing adoption costs and facilitating market penetration. 9
  • 10. Defentect DM3 Proven threat awareness solution • Developed under Chairman Paul Bremer, Ambassador-at-Large for Counterterrorism and U.S. Administrator of Coalition Provisional Authority in Iraq. • Installed, operational and proven in “high value” target facilities in the US. • Gathers data from virtually any sensor which can live on a data network. • Seeks and identifies anomalies in the data. • Forwards the new information to an unlimited number of devices on any platform capable of receiving messages: SMS, email, smartphones, voicemail, XML. • Automatically forwards any digitized information—such as floor plans and the names and photographs of authorized personnel—to first responders. • All instantaneously and independent of operating personnel. • Continuous information delivered during the first 72 hours of an 10 attack—without relying on First Responders.
  • 11. PROVEN IN THE US • Participant in Operation Golden Phoenix Federal terrorism response laboratory, San Diego, with : – – – – – – – – U.S. Department of Homeland Security Customs and Border Protection, U.S. Marine Corps Aircraft Group 46, Department of Defense Drug Enforcement Agency Federal Bureau of Investigation Department of Justice, Department of Energy • At Golden Phoenix, Defentect monitored threat-level radiation at Brown Field Airport and Scripps Memorial Hospital La Jolla Among US installations: • AIT Worldwide Logistics, a global transportation provider • Walter Reed National Military Medical Center,premier Washington D.C. are Hospital Center for all senior 11 civilian/military.
  • 12. Defentect Difference • IP-based interface to legacy systems • Web-based management, monitoring, and messaging system • IP-based sensors at commercial prices • Commercial distribution channel • Existing pilots in operation • Wisdom of our advisors
  • 13.
  • 14. DELIVERY OF THE TOTAL SECURITY PACKAGE IDENTIFICATION/ASSESSMENT OF THREATS DESIGN THE SYSTEM DESIGN APPROPRIATE RESPONSE FOR ALARM SELECT APPROPRIATE SENSORS PURCHASE THE EQUIPMENT INSTALLATION OF THE SYSTEM TRAINING FOR THE USE OF THE SYSTEM TRAINING RAPID RESPONSE TEAM: 14
  • 15. DELIVERY OF THE TOTAL SECURITY PACKAGE 1. 2. 3. 4. 5. 6. 7. 8. IDENTIFICATION/ASSESSMENT OF THREATS: The Defentect Team will identify and assess the threats at each location that is specified. As this will be time-consuming and require site visits, travel costs and other out of pocket expenses, and subject matter experts (“SME’s”) charging a reasonable hourly rate to develop the plan, payment in advance of the estimated expenses plus half of the remaining cost to develop the plan. The Team will present the plan in an oral presentation. The remaining amount will be payable and due upon receipt of the written report, including any slides, of the Identification/Assessment of Threats. DESIGN THE SYSTEM: The Team will design the layout and sensor/CCTV/detector locations for each site specified. The amount will be payable upon delivery of the written report. DESIGN THE APPROPRIATE RESPONSE FOR ALARM: The Team will design the appropriate response, including who should be alerted and what messages should be sent out. The cost of designing the appropriate response and notification scheme will be due and payable upon delivery of the written report. SELECT APPROPRIATE SENSORS: The Team, working with relevant vendors, will select the appropriate sensors/video analytics/CCTV/motion detectors. This cost will included into the total cost of purchasing the equipment from manufacturers and video analytics software developers. PURCHASE THE EQUIPMENT. The Team will purchase the equipment upon receipt of the full purchase price in advance.. INSTALLATION OF THE SYSTEM: The Team will be responsible for the installation. Staged advance payments will be required. TRAINING FOR THE USE OF THE SYSTEM: This should take no more than one week’s time and will be built into the cost of installation . TRAINING RAPID RESPONSE TEAM: This will be the responsibility of the Defentect Team , which will include options for Mobile Training Teams at the customer’s training facility or training in the US. Payable in full in advance before any training can take effect. 15
  • 16. Next step: meeting to discuss the scope of work, detailed analysis of security, pricing IDENTIFICATION/ASSESSMENT OF THREATS DESIGN THE SYSTEM DESIGN APPROPRIATE RESPONSE FOR ALARM SELECT APPROPRIATE SENSORS PURCHASE THE EQUIPMENT INSTALLATION OF THE SYSTEM TRAINING FOR THE USE OF THE SYSTEM TRAINING RAPID RESPONSE TEAM: 16
  • 17. Contact Information Primary Contact: Brijesh Kumar, Ph.D. CSO/COO bkumar@rapidsoftsystems.com Rapidsoft Systems Inc. Princeton, NJ 08550 Phone: +1 609-439-4775