SlideShare a Scribd company logo
1 of 18
What are Appropriate Border 
Surveillance Technologies? 
Dr. Stephen Lee, Chief Scientist 
U.S. Army Research Office
United States – South Africa 
Border Surveillance Technology 
Cooperation Symposium 
Dr. Stephen Lee, Chief Scientist 
U.S. Army Research Office 
SEPTEMBER 16, 2014 • PRETORIA, SOUTH AFRICA
• U.S. ARO Overview 
• Counter Poaching Perspective 
• Projects Being investigated 
• Observations 
3
U.S. Army Research Office 
• 293 Institutes of higher learning 
• 1093 Individual investigators 
• 47 Research centers 
- 
Overview 
• Utilize the vast intellectual capital 
of our nation’s universities to: 
• Exploit scientific opportunities for 
revolutionary new Army capabilities 
• Drive science to develop solutions to existing 
Army technology needs 
• Accelerate transition of basic research 
• Strengthen university, industry, government 
partnerships 
• Educate and train the future S&E workforce 
for the Army 
Research ranges from atom optics for 
underground bunker/tunnel detection to nano-energetics 
for more powerful and insensitive 
munitions and propellants 
Research Thrusts 
 Chemistry 
 Computing and 
Info Science 
 Electronics 
 Environmental 
 Life Sciences 
 Materials 
 Mathematics 
 Mechanics 
 Network Science 
 Nanoscience 
 Physics
U.S. Army Research Office 
Organization 
Director 
Engineering 
Sciences 
Physical 
Sciences 
Chief Scientist 
Operations 
Directorate 
Special Assistant 
Information 
Sciences 
Support 
Management 
Physics 
Mechanical 
Sciences 
Mathematical 
Science 
Information 
Management 
Chemistry 
Materials 
Science 
Computational 
Sciences 
Acquisition 
Center 
Life 
Sciences 
Electronics 
Network 
Sciences 
Environmental 
Sciences 
Outreach 
Programs 
Military Deputy 
Legal Counsel 
ARO executes the majority of ARL’s 
university research 
~ 100 employees at RTP, NC 
44 PhD Program Managers
U.S. Army Research Office 
International Cooperation
Perspective: 
The U.S. Army Faces Similar Challenges 
to those of Counter Poaching Activities 
ONE of 1,000+ in South Africa in 2013 
Infiltration 
Large Area 
Surveillance 
Small Unit Conflict 
Smuggling
To Win, we need to get ahead of the Act 
Counter Improvised Explosive Device 
Acquire & Store 
Transport 
Counter Poaching 
Bomb 
Builder 
Transport Device 
Concealment 
Detonation 
The Act 
Acquire 
Train 
Recruit 
Spot 
Infiltrate
Counter Poaching 
R&D Technical Framework 
Organized Crime / State-sponsored Corruption 
Local 
Handlers 
Poachers 
Local 
Transport 
National 
Transport 
International 
Transport Manufacturers Suppliers 
Consumers 
Poaching Supply Chain 
Indigenous 
Initiated
Organized Crime / State-sponsored Corruption 
Local 
Handlers 
Poachers 
Local 
Transport 
National 
Transport 
International 
Transport Manufacturers Suppliers 
Indigenous 
Initiated 
Night Vision 
UAVs, Aerostats Dyes 
Unattended Sensors GPS Tags 
Poaching Supply Chain 
Horse-Dog Teams Ethnographic Analysis 
RFID Proximity Tags Forward-Deployed Forensic Labs 
Consumers 
Counter Poaching 
R&D Technical Framework 
Poaching
Organized Crime / State-sponsored Corruption 
Local 
Handlers 
Poachers 
Local 
Transport 
National 
Transport 
International 
Transport Manufacturers Suppliers 
Contraband Detectors 
GPS Tags & Seals 
Beef Test 
Indigenous 
Initiated 
Poaching Supply Chain 
Consumers 
Counter Poaching 
R&D Technical Framework 
Transportation
Organized Crime / State-sponsored Corruption 
Local 
Handlers 
Poachers 
Local 
Transport 
National 
Transport 
International 
Transport Manufacturers Suppliers 
Ethnographic 
Analysis 
Indigenous 
Initiated 
Poaching Supply Chain 
Consumers 
Counter Poaching 
R&D Technical Framework 
Consumer
Counter Poaching Funding Status 
U.S. Army R&D Technical Initiatives 
Current Funding Status 
Funded 
Partially Funded ** 
Organized Crime / State-sponsored Corruption 
Poaching Supply Chain 
Contraband Detectors 
GPS Tags & Seals 
Beef Test 
Local 
Handlers 
Demonstrations of existing Army Technologies & Systems ** 
Poachers 
Local 
Transport 
National 
Transport 
International 
Transport Manufacturers Suppliers 
Indigenous 
Initiated 
Consumers 
Night Vision 
UAVs, Aerostats Dyes 
Unattended Sensors ** GPS Tags 
Horse-Dog Teams Ethnographic Analysis 
RFID Proximity Tags Forward-Deployed Forensic Labs 
Ethnographic 
Analysis
Contraband Detection 
Rhino Horn Sensing 
Supported by U.S. Fish & Wildlife Service and White Oak
Prototype Beef Test 
Discriminate Game Meat 
Objective 
To develop and field test a rapid 
analysis tool (~2 hours) to 
discriminate between “beef” and 
game meat to interdict poaching 
Positive on test identifies 
Cattle (Bos Taurus) or 
Zebu (Bos Indicus) or 
hybrids 
Negative on test indicates 
NOT Cattle (Bos Taurus) and 
NOT Zebu (Bos Indicus). 
Further laboratory testing is 
required to identify species.
Unattended Sensors 
Doppler Radar for ID & Tracking 
rScene® 
Micro Radar 
Classification 
Algorithms 
Supported by NC Zoo and MCQ Inc.
Unattended Sensors 
Doppler Radar for ID & Tracking 
• Objective to develop and field test a system 
for monitoring and tracking people, vehicles, 
and target animals. 
• Distinct animal signatures collected. 
• Each radar can monitor an area of 
approximately 100 by 300m 
• Radar can be complemented with seismic, 
acoustic, magnetic, and cameras 
Rhino Elephant 
Supported by NC Zoo and MCQ Inc. 
Dog 
Time  
Frequency 
Final Observations 
Observations 
Dr. Stephen Lee 
Chief Scientist 
U.S. Army Research Office 
stephen.j.lee28.civ@mail.mil 
919-549-4365 
P.O. Box 12211 
Research Triangle Park, North Carolina 
USA 27709-2211 
www.aro.army.mil

More Related Content

Similar to What are Appropriate Border Surveillance Technologies?

Eidws 112 intelligence
Eidws 112 intelligenceEidws 112 intelligence
Eidws 112 intelligence
IT2Alcorn
 
FTCOE_infographic_10_WEB
FTCOE_infographic_10_WEBFTCOE_infographic_10_WEB
FTCOE_infographic_10_WEB
Shane Hamstra
 

Similar to What are Appropriate Border Surveillance Technologies? (20)

Eidws 112 intelligence
Eidws 112 intelligenceEidws 112 intelligence
Eidws 112 intelligence
 
North Carolina Su
North Carolina SuNorth Carolina Su
North Carolina Su
 
Big Data & Analytics for Government - Case Studies
Big Data & Analytics for Government - Case StudiesBig Data & Analytics for Government - Case Studies
Big Data & Analytics for Government - Case Studies
 
ICAR 2015 Plenary - Chris Town
ICAR 2015 Plenary - Chris TownICAR 2015 Plenary - Chris Town
ICAR 2015 Plenary - Chris Town
 
Forensic techniques and crime scene investigation
Forensic techniques and crime scene investigationForensic techniques and crime scene investigation
Forensic techniques and crime scene investigation
 
ORCID Activities in Korea
ORCID Activities in KoreaORCID Activities in Korea
ORCID Activities in Korea
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigation
 
Presentation eco.pptx
Presentation eco.pptxPresentation eco.pptx
Presentation eco.pptx
 
8th Annual Night Vision Systems
8th Annual Night Vision Systems8th Annual Night Vision Systems
8th Annual Night Vision Systems
 
An Overview of Provenance Research Activities at Aberdeen
An Overview of Provenance Research Activities at AberdeenAn Overview of Provenance Research Activities at Aberdeen
An Overview of Provenance Research Activities at Aberdeen
 
New tools for field grains surveillance
New tools for field grains surveillanceNew tools for field grains surveillance
New tools for field grains surveillance
 
Free Essays On Racism In Australia
Free Essays On Racism In AustraliaFree Essays On Racism In Australia
Free Essays On Racism In Australia
 
Data are the new oil: Big data, data mining and bio - inspiring techniques
Data are the new oil: Big data, data mining and bio - inspiring techniquesData are the new oil: Big data, data mining and bio - inspiring techniques
Data are the new oil: Big data, data mining and bio - inspiring techniques
 
Data is the new oil: Big data, data mining and bio - inspiring techniques
Data is the new oil: Big data, data mining and bio - inspiring techniquesData is the new oil: Big data, data mining and bio - inspiring techniques
Data is the new oil: Big data, data mining and bio - inspiring techniques
 
FTCOE_infographic_10_WEB
FTCOE_infographic_10_WEBFTCOE_infographic_10_WEB
FTCOE_infographic_10_WEB
 
Livestock-Climate Change CRSP Annual Meeting 2011: MLPI-2 Project Update (J. ...
Livestock-Climate Change CRSP Annual Meeting 2011: MLPI-2 Project Update (J. ...Livestock-Climate Change CRSP Annual Meeting 2011: MLPI-2 Project Update (J. ...
Livestock-Climate Change CRSP Annual Meeting 2011: MLPI-2 Project Update (J. ...
 
comprehensive-journey-into-the-world-of-forensic-science-.pdf
comprehensive-journey-into-the-world-of-forensic-science-.pdfcomprehensive-journey-into-the-world-of-forensic-science-.pdf
comprehensive-journey-into-the-world-of-forensic-science-.pdf
 
Essay On Tactical Analysis
Essay On Tactical AnalysisEssay On Tactical Analysis
Essay On Tactical Analysis
 
Forensic workshops
Forensic workshopsForensic workshops
Forensic workshops
 
Military radar Summit
Military radar Summit Military radar Summit
Military radar Summit
 

Recently uploaded

Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 

What are Appropriate Border Surveillance Technologies?

  • 1. What are Appropriate Border Surveillance Technologies? Dr. Stephen Lee, Chief Scientist U.S. Army Research Office
  • 2. United States – South Africa Border Surveillance Technology Cooperation Symposium Dr. Stephen Lee, Chief Scientist U.S. Army Research Office SEPTEMBER 16, 2014 • PRETORIA, SOUTH AFRICA
  • 3. • U.S. ARO Overview • Counter Poaching Perspective • Projects Being investigated • Observations 3
  • 4. U.S. Army Research Office • 293 Institutes of higher learning • 1093 Individual investigators • 47 Research centers - Overview • Utilize the vast intellectual capital of our nation’s universities to: • Exploit scientific opportunities for revolutionary new Army capabilities • Drive science to develop solutions to existing Army technology needs • Accelerate transition of basic research • Strengthen university, industry, government partnerships • Educate and train the future S&E workforce for the Army Research ranges from atom optics for underground bunker/tunnel detection to nano-energetics for more powerful and insensitive munitions and propellants Research Thrusts  Chemistry  Computing and Info Science  Electronics  Environmental  Life Sciences  Materials  Mathematics  Mechanics  Network Science  Nanoscience  Physics
  • 5. U.S. Army Research Office Organization Director Engineering Sciences Physical Sciences Chief Scientist Operations Directorate Special Assistant Information Sciences Support Management Physics Mechanical Sciences Mathematical Science Information Management Chemistry Materials Science Computational Sciences Acquisition Center Life Sciences Electronics Network Sciences Environmental Sciences Outreach Programs Military Deputy Legal Counsel ARO executes the majority of ARL’s university research ~ 100 employees at RTP, NC 44 PhD Program Managers
  • 6. U.S. Army Research Office International Cooperation
  • 7. Perspective: The U.S. Army Faces Similar Challenges to those of Counter Poaching Activities ONE of 1,000+ in South Africa in 2013 Infiltration Large Area Surveillance Small Unit Conflict Smuggling
  • 8. To Win, we need to get ahead of the Act Counter Improvised Explosive Device Acquire & Store Transport Counter Poaching Bomb Builder Transport Device Concealment Detonation The Act Acquire Train Recruit Spot Infiltrate
  • 9. Counter Poaching R&D Technical Framework Organized Crime / State-sponsored Corruption Local Handlers Poachers Local Transport National Transport International Transport Manufacturers Suppliers Consumers Poaching Supply Chain Indigenous Initiated
  • 10. Organized Crime / State-sponsored Corruption Local Handlers Poachers Local Transport National Transport International Transport Manufacturers Suppliers Indigenous Initiated Night Vision UAVs, Aerostats Dyes Unattended Sensors GPS Tags Poaching Supply Chain Horse-Dog Teams Ethnographic Analysis RFID Proximity Tags Forward-Deployed Forensic Labs Consumers Counter Poaching R&D Technical Framework Poaching
  • 11. Organized Crime / State-sponsored Corruption Local Handlers Poachers Local Transport National Transport International Transport Manufacturers Suppliers Contraband Detectors GPS Tags & Seals Beef Test Indigenous Initiated Poaching Supply Chain Consumers Counter Poaching R&D Technical Framework Transportation
  • 12. Organized Crime / State-sponsored Corruption Local Handlers Poachers Local Transport National Transport International Transport Manufacturers Suppliers Ethnographic Analysis Indigenous Initiated Poaching Supply Chain Consumers Counter Poaching R&D Technical Framework Consumer
  • 13. Counter Poaching Funding Status U.S. Army R&D Technical Initiatives Current Funding Status Funded Partially Funded ** Organized Crime / State-sponsored Corruption Poaching Supply Chain Contraband Detectors GPS Tags & Seals Beef Test Local Handlers Demonstrations of existing Army Technologies & Systems ** Poachers Local Transport National Transport International Transport Manufacturers Suppliers Indigenous Initiated Consumers Night Vision UAVs, Aerostats Dyes Unattended Sensors ** GPS Tags Horse-Dog Teams Ethnographic Analysis RFID Proximity Tags Forward-Deployed Forensic Labs Ethnographic Analysis
  • 14. Contraband Detection Rhino Horn Sensing Supported by U.S. Fish & Wildlife Service and White Oak
  • 15. Prototype Beef Test Discriminate Game Meat Objective To develop and field test a rapid analysis tool (~2 hours) to discriminate between “beef” and game meat to interdict poaching Positive on test identifies Cattle (Bos Taurus) or Zebu (Bos Indicus) or hybrids Negative on test indicates NOT Cattle (Bos Taurus) and NOT Zebu (Bos Indicus). Further laboratory testing is required to identify species.
  • 16. Unattended Sensors Doppler Radar for ID & Tracking rScene® Micro Radar Classification Algorithms Supported by NC Zoo and MCQ Inc.
  • 17. Unattended Sensors Doppler Radar for ID & Tracking • Objective to develop and field test a system for monitoring and tracking people, vehicles, and target animals. • Distinct animal signatures collected. • Each radar can monitor an area of approximately 100 by 300m • Radar can be complemented with seismic, acoustic, magnetic, and cameras Rhino Elephant Supported by NC Zoo and MCQ Inc. Dog Time  Frequency 
  • 18. Final Observations Observations Dr. Stephen Lee Chief Scientist U.S. Army Research Office stephen.j.lee28.civ@mail.mil 919-549-4365 P.O. Box 12211 Research Triangle Park, North Carolina USA 27709-2211 www.aro.army.mil