In the future, a victim of a crisis should be able to press a few buttons on a mobile phone, and instantly, an icon appears somewhere on an incident commanders map, telling him the victim ’ s location, status, and any pictures or audio reports. When we bring integrated micro-sensors into the field of vision, the incident commander can even get a read on the presence of any biological or chemical contaminants. I don ’ t know if you can make out this picture, but this is a photo sent by a London Underground bombing victim trying to get out of a subway station shortly after the 7/7 attacks. I remember watching this live on Fox News when it was happening. It really burned me up when I saw this, because it ’ s just another example of the private sector out-pacing the government in the exploitation of emerging technology. Why didn ’ t we have this during Katrina? How many people didn ’ t have to drown to death if their own homes if they could have gotten the right information to the people controlling the helicopters and the HMMWVs?
Transcript of "Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010"
REMOVE THIS: I have edited only certain things, not sure about changing other text (like company name) since this was something from a conference in 2006Evolutionary Detection and Prevention of Improvised Explosive Devices and Related Terrorist Weapons SMi CBRN 20 September, 2006 Martin Joseph Dudziak PhD TETRAD Technologies Group, Inc. Richmond, VA (USA)
Three Absolutes for Adequate Protection Against Today’s and Tomorrow’s Terrorists • Ability to Think and Act Ahead, not merely reactively, postfacto Martin, 7.jan.10: Martin, 7.jan.10: Conventional TNT for instance, one for instance, one Compact C4, Cemtex can add not only can add not only body-wrap but body- body-wrap but body- cavity-insert HMTD, TATP cavity-insert weaponry - -the drug weaponry the drug carriers perfected ???? carriers perfected that art long ago that art long ago • High-sensitivity for multiple substances in diverse environments • Not limited to one type of chemical agents • Not restricted to particular operating environments and architectures (functional and literal chokepoints and get-arounds) • Usability – the non-technical-specialist needs to be able to use this effectively without a great deal of concentration or specialized learning (If it is so specialized and sensitive, it will have predictable operational fail-points)Copyright 2006 TETRAD Technologies Group, Inc.
High-Demand Challenges • Weapon Technology – Chemistry – Architecture – Concealment • Weapon Effectiveness – Fault-tolerance and Fail-safe Mechanisms – Necessary vs. Sufficient Yield – Ability to mimic false positives and build “immunity” to detection • Detection Strategy – Must evolve from “detect at point of deployment” to “detect at place of design and manufacture” – Must “look ahead” to new weapon design engineering, operationsCopyright 2006 TETRAD Technologies Group, Inc.
Lessons from Manila, London et al Martin, 7.jan.10: Martin, 7.jan.10: • Finding This paper and This paper and presentation was – “Mega-bureaucracy” practices are reinforcing an “ossification”was presentation originally 2005, then originally 2005, then process that inhibits innovation and variation. reshaped for 2006, reshaped for 2006, – and all the big “Plans and plots disrupted in the nick of time” - not a and all the big strong agencies and defence but an invitation to keep trying. agencies and bureaucracies have bureaucracies have – “Thinking outside the box” is the enemy’s strength but is exactly the done a done exactly the wrong things, even technique discouraged in various “noveau securité” the opposite of even circles. wrong things, the opposite ofthis this • Recommendation sound strategy. sound strategy. – Need for more versatile programs and contracting vehicles. • Applying “innocent until proven guilty” attitude into “plausible until demonstrated otherwise” • Mobility and transformability • Unpredictability from the perspective of the enemy – Need for “gateway intelligence systems” comparable to gateway communications (e.g. Raytheon ACU-1000) that allow for interoperability. – Need for more than “Yada yada” – Yet Another Device AgainCopyright 2006 TETRAD Technologies Group, Inc.
Solutions • One reconfigurable, easy, cheap, adaptable Martin, 7.jan.10: Martin, 7.jan.10: technology (applying what EE & IT learned long ago)Likeeven Obamaall Like even Obama admits now, and admits now, and all the smart Old-Guard the smart Old-Guard (retired) NSC and (retired) NSC and • Non-intrusive for mass transit, esp. air travel CIA guys are saying, CIA guys are saying, WE HAVE NO WE HAVE NO SYEM, NO SYEM, NO INTEGRATION, just INTEGRATION, just aalot of data • Harder (for terrorists) to predict or get-around by lot of data collection. This is collection. This is coming up with a modified chemistry or biology like being able to like being able to cut, split and stack cut, split and stack firewood, but have firewood, but have no stove in which to no stove in which to • Integrable with Existing Detection and Inspection burn it. what burn it. what happens? You happens? You Systems freeze to death. freeze to death.Copyright 2006 TETRAD Technologies Group, Inc.
Martin, 7.jan.10: Martin, 7.jan.10: This is not imaginary This is not imaginary but real and ready JEDI (aka “CEBIT”) but real and ready for mfgr. and use - - for mfgr. and use the images at left the images at left Chemical Explosive Biothreat Identification are from working and Tracking are from working prototypes, from prototypes, from 2005 and earlier!!! 2005 and earlier!!! AF123 – LAX – DCL PWR MEM 1234567-BROWNJ MSL PROC (e.g., 4x4 cell Battery array) ACTCopyright 2006 TETRAD Technologies Group, Inc.
Chemical Explosive Biothreat Identification and Tracking JEDI / CEBIT A solution that (economically, and ergonomically) CAN “cover all bases” Components: 1. An extensible grid (array) of multi-spectral, multi-functional sensor elements – Not Only For Explosives (but that is the Present Focus and Demand). 2. A chip set operating in a card package – self-contained, self-powered, easy, robust, and very inexpensive. 3. A human factors system that is unobtrusive and can increase protection while speeding up the inspection process. 4. Adaptable “engine” to meet future needs (especially “E” and “B” threats) As They Emerge. 5. Aerosol concentrator auxiliary system to handle cases of extremely difficult concentrations due to the nature of the compound or the operating environment. 6. A scalable architecture that can be operated as a network in a number of confined physical environments or expanded to roadside/neighborhood outdoor operations.Copyright 2006 TETRAD Technologies Group, Inc.
JEDI / CEBIT CHECK-IN Activation Checked Checked Carry-On Checked Martin, 7.jan.10: Martin, 7.jan.10: We were told by We were told by bureaucrats in DHS, bureaucrats in DHS, Working JIEDDO and TSWG Security (Std) JIEDDO and TSWG Security (Std) in 2005, 2006, 2007 in 2005, 2006, 2007 that all this was not that all this was not necessary because necessary because the problem was the problem was solved and under solved and under control - -I Ikid you control kid you not! not! GATE Validation Validation PRE-LOADCopyright 2006 TETRAD Technologies Group, Inc.
Chemical Explosive Biothreat Identification and Tracking JEDI / CEBIT Analysis based upon predictive, modeling-building order/lattice theory, inverse methods, support vector algorithms, and related nonlinear reasoning models ♦ Reliance upon sensors, Bayesian PR, post-symptomatic reports alone is insufficient ♦ Greatest risk of missing the threat underway is in slow ability to rapidly plan and coordinate response on multiple levels – similar as with biothreats – sensing agents, decon, sampling, diagnosis, treatments ♦ Information Integration must occur at the micro (chip) level ♦ JEDI (CEBIT) learns from what worked and failed in similar system environments ♦ Confirmation and refinement of identified threats, false positives requires improved methods – SVM and IRM (GENET) can provide better discrimination & classification ♦ Coordination of resources, teams, delivery, dissemination, disbursement requires the approach used in CHAIN and COPFCopyright 2006 TETRAD Technologies Group, Inc.
JEDI / CEBIT Hierarchically ordered networks of relations (events)Copyright 2006 TETRAD Technologies Group, Inc.
JEDI / CEBIT NOT ONLY for Operation at TARGETS but at SOURCESCopyright 2006 TETRAD Technologies Group, Inc.
Chemical Explosive Biothreat Identification and Tracking JEDI CONOPS Model – built upon biological foundationsCopyright 2006 TETRAD Technologies Group, Inc.
Chemical Explosive Biothreat Identification and Tracking Incident (Site) Prediction Example Detections during span t1,2 Reported Indicators overlapping t1,2 IRM Predicted Convergence post-t2 Predicted Incidents post-t2Copyright 2006 TETRAD Technologies Group, Inc.
Chemical Explosive Biothreat Identification and Tracking The GIS components are essential for critical data and interactive human+machine analysis. The missing ingredients are available and readily integrated with the mathematical analytics. With architectures such as Nomad Eyes or Red Cell, the communication gaps can be crossed for data gathering, verification, planning and response.Copyright 2006 TETRAD Technologies Group, Inc.
NEXT STEPS Needed Now, Not After Another 9-11 JEDI / CEBIT IS READY FOR FIELD TESTING AND PROTOTYPING Actions Required: One Agency that wants to take the lead in protecting their people, their country. One specific flexible, receptive test environment (real airport, real neighborhood). One firm step forward to enable co-creating the fieldable, working operational system. One “break” from the monotony of the usual prolonged set of procedures and delays that often are indirectly serving the aims of terrorists. A few open doors. A modest budget. A unified team with the determination to stop those who want to destroy our lives.Copyright 2006 TETRAD Technologies Group, Inc.
Contacts TETRADYN (TETRAD Dynamics)Martin Dudziak (Exec Chmn) 28 Chase Gayton Circle, Suite 731 – (757) 847-5511 Richmond, VA 23238 USA – (804) 740-0342 – (202) 415-7295 – firstname.lastname@example.org– also see http://tetradyn.com/contact.php for more of the business team
CUBIT CONOPS Vision Unified Communications from Every PerspectiveReal-Time Situational Awareness: Decision-makers can get the helicopters and HMMWVsto the victims fast!Get the Right Information to the RightPeople for the Purpose of Saving Lives. Translating Data Visualization & Analysis into concrete “go here, don’t go there” messages
Coordinated Unified Biothreat Intervention and Tracking • Verona™ is a field-tested intelligent knowledge management and discovery notebook  • Command-Post-of-the-Future is now in-the-present serving US forces  • CMDRS  and other agent-based situation awareness and knowledge discovery components are readily adaptable to Clinical Medicine, Epidemiology, Disease Management and Public Health applicationsCopyright 2006 TETRAD Technologies Group, Inc.
Coordinated Unified Biothreat Intervention and Tracking CHAIN Overview Chain API Web Monitor Monitor V Monitor Monitor Clients Agents Monitor Agents I Agents Agents Agents E Analysis Analysis W Fat Analysis Clients Agents Agents Agents Intelligent Services C Layer (ISL) N CMD T Line Notification L Agents Chain Chain Chain Agents AgentsUtilizes ISL for Agent Agents Intelligent Workflow Multiple Comm Protocols Management - SOAP/HTTPCoordination - RMI/IIOP CHAIN Implement Plans which Operate on Events & Operator Direction Engine Communicate Knowledge Across Monitor, Analysis, Notification Activities - Query Databases, Repositories, Web Pages, & Sensors Execute External Processes - Monitor Critical Events Across the Globe Based on Results - Intelligently Notify Users of Critical EventsCopyright 2006 TETRAD Technologies Group, Inc.
ISL Architecture CMDRS Weather Data Fire/Rescue Desktop Law Enforcement Intelligent Services D-COP Layer (ISL) Data Data Master Schedule Wrappe Wrappe rr Unit Locations Data Data Wrapper Wrapper Data Data Wrapper Wrapper Health Services Traffic Data GeologicalNational Guard Data Coast Guard Public Services
LumINT: Knowledge Discovery Intelligent Agents Analyst Portal Federated Search GIS Search Le Monde Al Jazeera >> and Person… or Organization Ettelaat Location not Keyword Search Clear Reset Save as Search Agent Search AgentsKnowledge Organizer Concept Analysis Agent and Service based Integration Framework Best of Breeds COTS Translation Visualization Link Analysis
LumINT Information Flow Verity Chiliad CHAIN Search Federated Agents Search Document Collection Indexes Yahoo LumINT News J2EE KStore Mediator WebAppsVerona GoogleNotebook Search Tool Mediator QuickTime™ and a Discovery TIFF (Uncompressed) decompressor are needed to see this picture. Service Workflow Controller Concept Agent Analysis Engine Concept Database
*** Advanced Visualizations *** CASE Applications GUI CASE Evaluation Tools Common Look and Feel Quantitative AnalysisPortal - Distributed Collaborative Content Sharing Workflow Manager *** CASE Web Services Analyst Activity and Agents Components Logger Core Services and Agents ** Knowledge RepresentationCommon Infrastructure Components Mediator (e.g. OWL, KIF, CL, OKBC) Information Sharing Policy Manager - Per-agency or per-analyst Security Guard - (e.g. ISSE Guard, Radiant Mercury, InfoPump) Grid Enabled Integration Framework - Plug-and Play of ALL componentsDocuments Message Streams Knowledge Logger RDBMS WWW Repositories Repository
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.