SlideShare a Scribd company logo
1 of 12
1
The Patriot Group
Market Segments
Ports
Strategic Assets Oil/Gas Platforms Cruise Liners
CONFIDENTIAL BRIEFING
Rural Gas/Oil Production Congested Areas
Core Competencies
The Patriot Group
Beneath the Surface
Detection and Deterrence
Surface and Perimeter
Detection and Deterrence
Systems Integration and
Cybersecurity
Counter-terrorism and Homeland Security
solutions include restricted access control,
24/7 video surveillance and intrusion
detection/deterrence via perimeter, water
surface and beneath-the-surface capabilities.
Solutions include token and biometric
identification (hardened facilities), Digital and
Infrared CCTV capabilities, Unmanned Surface
Vehicles, Sonar (diver detection, ship hull and
infrastructure inspections) and Unmanned
Underwater Vehicles. Deterrence includes
non-lethal (U.S.) and lethal (international)
solutions.
2
System Integration and Cybersecurity
The Patriot Group
3
Maritime Domain
The Patriot Group
Maritime Transportation Security Act of 2002
101 Findings; (1) …there are 361 public ports in the
United States that are an integral part of our Nation’s
commerce, (6) …Ports are a major focus of Federal
crimes, including drug trafficking, cargo theft, and
smuggling of contraband and aliens, (7) …Ports are
often very open and exposed and are susceptible to
large scale acts of terrorism that could cause a large loss
of life or economic disruption, (10) …Securing entry
points and other areas of port facilities…would increase
security at United States ports.
4
The Patriot Group
In today’s connected world, the role of system integration is becoming more
and more important as more systems are designed to connect, both within
the system under construction and to systems that are already deployed.
Despite well-documented protocol vulnerabilities and rampant threats, The
Patriot Group seamlessly integrates WLAN and WAN disparate security
technologies into a myriad of distributed backbone platforms. With many
legacy systems in place, our engineers design a IP pathway for convergence
for these previously proprietary, non-standardized devices as well as making
recommendations for current surveillance technologies.
System Integration
Software analytics; depending on the solution set, our engineers have expertise in implementing surveillance
product and intelligent video from both a centralized and distributed system.
In a central monitoring of traditional CCTV systems surveillance video can be fed directly from the analog
cameras into an intelligent video-enabled DVR. The DVR will perform the video analytics (people counting or car
license plate extraction for example) before taking the remaining data, digitizing, compressing, and recording it;
and distributing the resulting alarms and video output to authorized operators.
Distributed architectures are designed to overcome the limitations of centralized architectures by distributing
the processing to different elements in the network. The most scalable, cost-effective and flexible architecture is
based on ‘intelligence at the edge’, that is, processing as much of the video as possible in the network cameras,
or video encoders themselves. 5
The Patriot Group
Many companies have partnered with security consulting companies that
offer a piece of the pie. The Patriot Group is prepared to bridge the gap
between the physical and logical security needs of your company. The
Patriot Group understands that security is no longer a “half-court” game.
The high stakes endeavor to control risk within the oil and gas industry
now must consider the entire playing field ranging from physical security,
agile monitoring , edge-out IT defense and sophisticated insider threat
detection and mitigation services. The Patriot Group is ready to stand
with you, to offer true security intelligence and to bring to bear the best
of breed solutions in a true systems engineering approach.
While it's true that there are no “impenetrable IT targets”, a company can take reasonable steps to mitigate
risk. Cyber actors are not unlike other criminal actors as most are opportunist. Making your connected
systems harder or more expensive to attack blunts all but the most focused bad actors. These miscreants will
Try elsewhere. Thus, defense in depth and a vigilant balanced approach to IT
will pay huge dividends for your business. TPG core competencies include:
 Network Security
 Security & Vulnerability Research
 IT Ecosystem Inspection
 Threat Detection and Prevention
 IT Forensic Audit
 Insider Threat Mitigation
 IT Data Analytics
Cybersecurity
6
Surface Threats & Targets
The Patriot Group
Providing strategic and tactical security
solutions for stake and stockholders in the
prevention of intentional damage through
sabotage, subversion, or terrorism including;
Ports, Vessels and Facilities located in, on,
under, or adjacent to any waters subject to the
jurisdiction of the U.S.
7
Potential Non-Maritime Targets
The Patriot Group
TOP SECRET FACILITIES: Built during the
Cold War as a relocation site for high-level
officials in case of national disaster, Mount
Weather plays a key role in U.S. continuity of
government plans. It’s located in the Blue
Ridge Mountains about 48 miles from
Washington, D.C., and consists of two parts:
the above-ground FEMA complex and the
600,000-square-foot underground facility.
A lone wolf or lone-wolf
fighter is someone who
commits or prepares for, or
is suspected of committing
or preparing for, violent acts
in support of some group,
movement, or ideology, but
who does so alone, outside
of any command structure
and without material
assistance from any group.
8
The Patriot Group
Surface Detection & Deterrence
While agnostic in selecting surveillance product, an example is the Axis PTZ dome network camera
which provides pan, tilt and zoom functions, enabling wide area coverage and great details when
zooming in. The PTZ domes support features such as guard tour, tour recording, audio, input/output
ports for external alarm devices, Gatekeeper functionality, autotracking, AXIS Camera Application
Platform for intelligent video applications, and weather-proofing, including Arctic Temperature
Control for extremely cold conditions.
The most widely chosen solution for offshore communications, satellite communications requires a
VSAT, or very small aperture terminal, at the offshore site; a broadband satellite connection in space;
and a teleport onshore. Available anywhere in the world, satellite services are used many times for
vessels that may be on the move, or extremely remote locations. The only drawbacks to satellite
services are a slight delay in data transmittal and finite bandwidth.
The emergence of sophisticated, pilotless aircraft is presenting energy companies with an
alternative method for keeping an eye on operations in the Arctic and other harsh environments
where they often work. Unmanned aerial vehicles flying over pipelines while outfitted with special
sensors could detect leaks quickly and the potential applications for surface surveillance for
offshore platforms adds another dimension of security to Maritime and other strategic assets.
Surface security to survey and secure maritime infrastructures unmanned vehicles offer efficient
solutions such as assets protection, maritime surveillance and security. Unmanned surface vehicles
(USV) can fill all parts of the solution in protecting critical infrastructures at sea, from surveillance,
recognition, alerting, to finally neutralizing the threat.
9
Beneath the Surface Targets
The Patriot Group
10
Documented Threats
Semi-submersible
Attachable Limpet Mines
Mini-subs
Submersed Propulsion Sled
The Patriot Group
11
12
The Patriot Group
Beneath the Surface Detection & Deterrence
Various sonar systems reliably detect, track and classify divers and small underwater vehicles
approaching a protected asset from any direction and alerts security personnel to the potential
threat. Whether it is protecting a critical infrastructure facility, offshore platform, sea port or super
yacht at anchor, Sonar's autonomous monitoring capabilities, long range detection and proven low
false alarm rates, provide a rapidly deployable, 180° to 360° underwater security solution for any
application.
Maritime Defense Systems and Sea Barriers are another layer of security for critical assets
vulnerable to boat or diver attacks. In a security-conscious world, both government assets– Navy
Bases, Navy Ships in Hostile Territories, Coast Guard Boats and Facilities– and private assets– Ports,
LNG Terminals, LNG Tankers, Nuclear Facilities, Oil Rigs and Facilities, Desalination Plants, Pipelines
and Cruise Ships– have a real, immediate, and critical need for high levels of protection.
Near-term applications for generations of Unmanned Underwater Vehicles span a wide range, from
intelligence, surveillance and reconnaissance; mine countermeasures; anti-submarine warfare;
inspection and identification; oceanography; communications and navigation network nodes;
payload delivery; information operations; and time-critical strike, according to the Navy Unmanned
Undersea Vehicle Master Plan.
Performs the type of dangerous roles
currently performed by service men and
women throughout the world - locate,
identify and neutralize mines in one single
mission without the need for human
intervention
Port facilities, nuclear power plants,
commercial carriers and other vessels are
prime targets for terrorist. Various
technologies are designed to protect against
threats posed by underwater diver’s intent on
carrying out their missions of mayhem.
12

More Related Content

What's hot

[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor FiorimTI Safe
 
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomiIvan Carmona
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)Ivan Carmona
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsJohn Rhoton
 
Gen4 Raptor Flyer
Gen4 Raptor FlyerGen4 Raptor Flyer
Gen4 Raptor FlyerTyler Rack
 
Industrial Cybersecurity & SCADA hacks presentation
Industrial Cybersecurity & SCADA hacks presentationIndustrial Cybersecurity & SCADA hacks presentation
Industrial Cybersecurity & SCADA hacks presentationGavin Davey
 
Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7Filip Maertens
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsMichelle Morgan-Nelsen
 
Tbs Explanation
Tbs ExplanationTbs Explanation
Tbs ExplanationRafiSela
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】Hacks in Taiwan (HITCON)
 
Tool track for aviation rfid
Tool track for aviation rfidTool track for aviation rfid
Tool track for aviation rfidDynamic Systems
 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringWaterfall Security Solutions
 
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...Nexie_verena
 

What's hot (16)

[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
Gen4 Raptor Flyer
Gen4 Raptor FlyerGen4 Raptor Flyer
Gen4 Raptor Flyer
 
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
 
Industrial Cybersecurity & SCADA hacks presentation
Industrial Cybersecurity & SCADA hacks presentationIndustrial Cybersecurity & SCADA hacks presentation
Industrial Cybersecurity & SCADA hacks presentation
 
Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
 
Tbs Explanation
Tbs ExplanationTbs Explanation
Tbs Explanation
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
 
Tool track for aviation rfid
Tool track for aviation rfidTool track for aviation rfid
Tool track for aviation rfid
 
VideoEdge Cybersecurity v4.6 - May 2015
VideoEdge Cybersecurity v4.6 - May 2015VideoEdge Cybersecurity v4.6 - May 2015
VideoEdge Cybersecurity v4.6 - May 2015
 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and Engineering
 
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...
 
Fortinet Broşür
Fortinet BroşürFortinet Broşür
Fortinet Broşür
 

Similar to 2013 Basic Presentation-A

Udi 2009 Presentation
Udi 2009 PresentationUdi 2009 Presentation
Udi 2009 Presentationdnatelso
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaAngeloluca Barba
 
OroliaCorporateBrochure-20Nov2016
OroliaCorporateBrochure-20Nov2016OroliaCorporateBrochure-20Nov2016
OroliaCorporateBrochure-20Nov2016Sheri Ascencio
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSiQHub
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSiQHub
 
Vessel Traffic Management System
Vessel Traffic Management SystemVessel Traffic Management System
Vessel Traffic Management SystemRolta
 
24 6 2011 Port Security
24 6 2011 Port Security24 6 2011 Port Security
24 6 2011 Port SecurityFiroze Hussain
 
Maritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsMaritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsDimitris Chalambalis
 
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...Firoze Hussain
 
CryptoMagazin_English
CryptoMagazin_EnglishCryptoMagazin_English
CryptoMagazin_EnglishRalf Winzer
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET Journal
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
Diamond offshore drilling transforms control infrastructure from target to ce...
Diamond offshore drilling transforms control infrastructure from target to ce...Diamond offshore drilling transforms control infrastructure from target to ce...
Diamond offshore drilling transforms control infrastructure from target to ce...IntelligentManufacturingInstitute
 
MilitaryRadar2015FullAgenda_12
MilitaryRadar2015FullAgenda_12MilitaryRadar2015FullAgenda_12
MilitaryRadar2015FullAgenda_12Trevor Sosvielle
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017Riaan Bellingan
 
The rise of the robot and the lie of resilience
The rise of the robot and the lie of resilienceThe rise of the robot and the lie of resilience
The rise of the robot and the lie of resilienceGirija Shettar
 
sicurit_product_overview_web
sicurit_product_overview_websicurit_product_overview_web
sicurit_product_overview_webLorenzo Beccacece
 

Similar to 2013 Basic Presentation-A (20)

Udi 2009 Presentation
Udi 2009 PresentationUdi 2009 Presentation
Udi 2009 Presentation
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
OroliaCorporateBrochure-20Nov2016
OroliaCorporateBrochure-20Nov2016OroliaCorporateBrochure-20Nov2016
OroliaCorporateBrochure-20Nov2016
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
Vessel Traffic Management System
Vessel Traffic Management SystemVessel Traffic Management System
Vessel Traffic Management System
 
24 6 2011 Port Security
24 6 2011 Port Security24 6 2011 Port Security
24 6 2011 Port Security
 
Maritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsMaritime Security & Port Security Solutions
Maritime Security & Port Security Solutions
 
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
 
CryptoMagazin_English
CryptoMagazin_EnglishCryptoMagazin_English
CryptoMagazin_English
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
 
Why AIS is not always enough
Why AIS is not always enoughWhy AIS is not always enough
Why AIS is not always enough
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
Diamond offshore drilling transforms control infrastructure from target to ce...
Diamond offshore drilling transforms control infrastructure from target to ce...Diamond offshore drilling transforms control infrastructure from target to ce...
Diamond offshore drilling transforms control infrastructure from target to ce...
 
MilitaryRadar2015FullAgenda_12
MilitaryRadar2015FullAgenda_12MilitaryRadar2015FullAgenda_12
MilitaryRadar2015FullAgenda_12
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Nextgen
NextgenNextgen
Nextgen
 
The rise of the robot and the lie of resilience
The rise of the robot and the lie of resilienceThe rise of the robot and the lie of resilience
The rise of the robot and the lie of resilience
 
sicurit_product_overview_web
sicurit_product_overview_websicurit_product_overview_web
sicurit_product_overview_web
 

2013 Basic Presentation-A

  • 1. 1 The Patriot Group Market Segments Ports Strategic Assets Oil/Gas Platforms Cruise Liners CONFIDENTIAL BRIEFING Rural Gas/Oil Production Congested Areas
  • 2. Core Competencies The Patriot Group Beneath the Surface Detection and Deterrence Surface and Perimeter Detection and Deterrence Systems Integration and Cybersecurity Counter-terrorism and Homeland Security solutions include restricted access control, 24/7 video surveillance and intrusion detection/deterrence via perimeter, water surface and beneath-the-surface capabilities. Solutions include token and biometric identification (hardened facilities), Digital and Infrared CCTV capabilities, Unmanned Surface Vehicles, Sonar (diver detection, ship hull and infrastructure inspections) and Unmanned Underwater Vehicles. Deterrence includes non-lethal (U.S.) and lethal (international) solutions. 2
  • 3. System Integration and Cybersecurity The Patriot Group 3
  • 4. Maritime Domain The Patriot Group Maritime Transportation Security Act of 2002 101 Findings; (1) …there are 361 public ports in the United States that are an integral part of our Nation’s commerce, (6) …Ports are a major focus of Federal crimes, including drug trafficking, cargo theft, and smuggling of contraband and aliens, (7) …Ports are often very open and exposed and are susceptible to large scale acts of terrorism that could cause a large loss of life or economic disruption, (10) …Securing entry points and other areas of port facilities…would increase security at United States ports. 4
  • 5. The Patriot Group In today’s connected world, the role of system integration is becoming more and more important as more systems are designed to connect, both within the system under construction and to systems that are already deployed. Despite well-documented protocol vulnerabilities and rampant threats, The Patriot Group seamlessly integrates WLAN and WAN disparate security technologies into a myriad of distributed backbone platforms. With many legacy systems in place, our engineers design a IP pathway for convergence for these previously proprietary, non-standardized devices as well as making recommendations for current surveillance technologies. System Integration Software analytics; depending on the solution set, our engineers have expertise in implementing surveillance product and intelligent video from both a centralized and distributed system. In a central monitoring of traditional CCTV systems surveillance video can be fed directly from the analog cameras into an intelligent video-enabled DVR. The DVR will perform the video analytics (people counting or car license plate extraction for example) before taking the remaining data, digitizing, compressing, and recording it; and distributing the resulting alarms and video output to authorized operators. Distributed architectures are designed to overcome the limitations of centralized architectures by distributing the processing to different elements in the network. The most scalable, cost-effective and flexible architecture is based on ‘intelligence at the edge’, that is, processing as much of the video as possible in the network cameras, or video encoders themselves. 5
  • 6. The Patriot Group Many companies have partnered with security consulting companies that offer a piece of the pie. The Patriot Group is prepared to bridge the gap between the physical and logical security needs of your company. The Patriot Group understands that security is no longer a “half-court” game. The high stakes endeavor to control risk within the oil and gas industry now must consider the entire playing field ranging from physical security, agile monitoring , edge-out IT defense and sophisticated insider threat detection and mitigation services. The Patriot Group is ready to stand with you, to offer true security intelligence and to bring to bear the best of breed solutions in a true systems engineering approach. While it's true that there are no “impenetrable IT targets”, a company can take reasonable steps to mitigate risk. Cyber actors are not unlike other criminal actors as most are opportunist. Making your connected systems harder or more expensive to attack blunts all but the most focused bad actors. These miscreants will Try elsewhere. Thus, defense in depth and a vigilant balanced approach to IT will pay huge dividends for your business. TPG core competencies include:  Network Security  Security & Vulnerability Research  IT Ecosystem Inspection  Threat Detection and Prevention  IT Forensic Audit  Insider Threat Mitigation  IT Data Analytics Cybersecurity 6
  • 7. Surface Threats & Targets The Patriot Group Providing strategic and tactical security solutions for stake and stockholders in the prevention of intentional damage through sabotage, subversion, or terrorism including; Ports, Vessels and Facilities located in, on, under, or adjacent to any waters subject to the jurisdiction of the U.S. 7
  • 8. Potential Non-Maritime Targets The Patriot Group TOP SECRET FACILITIES: Built during the Cold War as a relocation site for high-level officials in case of national disaster, Mount Weather plays a key role in U.S. continuity of government plans. It’s located in the Blue Ridge Mountains about 48 miles from Washington, D.C., and consists of two parts: the above-ground FEMA complex and the 600,000-square-foot underground facility. A lone wolf or lone-wolf fighter is someone who commits or prepares for, or is suspected of committing or preparing for, violent acts in support of some group, movement, or ideology, but who does so alone, outside of any command structure and without material assistance from any group. 8
  • 9. The Patriot Group Surface Detection & Deterrence While agnostic in selecting surveillance product, an example is the Axis PTZ dome network camera which provides pan, tilt and zoom functions, enabling wide area coverage and great details when zooming in. The PTZ domes support features such as guard tour, tour recording, audio, input/output ports for external alarm devices, Gatekeeper functionality, autotracking, AXIS Camera Application Platform for intelligent video applications, and weather-proofing, including Arctic Temperature Control for extremely cold conditions. The most widely chosen solution for offshore communications, satellite communications requires a VSAT, or very small aperture terminal, at the offshore site; a broadband satellite connection in space; and a teleport onshore. Available anywhere in the world, satellite services are used many times for vessels that may be on the move, or extremely remote locations. The only drawbacks to satellite services are a slight delay in data transmittal and finite bandwidth. The emergence of sophisticated, pilotless aircraft is presenting energy companies with an alternative method for keeping an eye on operations in the Arctic and other harsh environments where they often work. Unmanned aerial vehicles flying over pipelines while outfitted with special sensors could detect leaks quickly and the potential applications for surface surveillance for offshore platforms adds another dimension of security to Maritime and other strategic assets. Surface security to survey and secure maritime infrastructures unmanned vehicles offer efficient solutions such as assets protection, maritime surveillance and security. Unmanned surface vehicles (USV) can fill all parts of the solution in protecting critical infrastructures at sea, from surveillance, recognition, alerting, to finally neutralizing the threat. 9
  • 10. Beneath the Surface Targets The Patriot Group 10
  • 11. Documented Threats Semi-submersible Attachable Limpet Mines Mini-subs Submersed Propulsion Sled The Patriot Group 11
  • 12. 12 The Patriot Group Beneath the Surface Detection & Deterrence Various sonar systems reliably detect, track and classify divers and small underwater vehicles approaching a protected asset from any direction and alerts security personnel to the potential threat. Whether it is protecting a critical infrastructure facility, offshore platform, sea port or super yacht at anchor, Sonar's autonomous monitoring capabilities, long range detection and proven low false alarm rates, provide a rapidly deployable, 180° to 360° underwater security solution for any application. Maritime Defense Systems and Sea Barriers are another layer of security for critical assets vulnerable to boat or diver attacks. In a security-conscious world, both government assets– Navy Bases, Navy Ships in Hostile Territories, Coast Guard Boats and Facilities– and private assets– Ports, LNG Terminals, LNG Tankers, Nuclear Facilities, Oil Rigs and Facilities, Desalination Plants, Pipelines and Cruise Ships– have a real, immediate, and critical need for high levels of protection. Near-term applications for generations of Unmanned Underwater Vehicles span a wide range, from intelligence, surveillance and reconnaissance; mine countermeasures; anti-submarine warfare; inspection and identification; oceanography; communications and navigation network nodes; payload delivery; information operations; and time-critical strike, according to the Navy Unmanned Undersea Vehicle Master Plan. Performs the type of dangerous roles currently performed by service men and women throughout the world - locate, identify and neutralize mines in one single mission without the need for human intervention Port facilities, nuclear power plants, commercial carriers and other vessels are prime targets for terrorist. Various technologies are designed to protect against threats posed by underwater diver’s intent on carrying out their missions of mayhem. 12