SlideShare a Scribd company logo
1 of 4
Use Case: CHAVE™ and Smart Tech™ Explosives Detection
Advancements in IP video surveillance technologies—such as video analytics, license plate
recognition, sensor and alert integration, behavior analytics and explosives detection—have
created cost effective, scalable solutions that are highly desired worldwide for their force
multiplication benefits and for increases in operational effectiveness.
Increasing operational effectiveness and reducing total cost of ownership for critical
infrastructure protection and mission critical operations is imperative as a Homeland Security
national priority.
SecureXperts and MSA Security, along with technology partners Bosch Security Services and
Genetec have developed an integration utilizing secure IP video cameras and recording systems
to provide scene analysis of suspicious images fromX-ray machines anywhere in the world to
the MSA Emergency Operations Center (EOC) in New York City for real-time analysis by
explosives detection Subject Matter Experts (SMEs).
MSA developed SmartTech™ as a way to enhance X-ray screening operations by providing
immediate access to experienced bomb technicians. SmartTech™ is a DHS Safety Act Certified
three tier web based system that can be linked to any X-ray machine being used to screen for
prohibited items. If an X-ray screener sees something suspicious or unusual during the
interpretation process, the operator can request a subject matter expert to assist them in real
time with the simple press of a button using our remote imaging capability that attaches to
Smiths Detection, Rapiscan, Astro Physics machines both traditional, as well as cargo and Eagle
Gantry type machines.
Using SmartTech™ and CHAVE™ enabled cameras can now learn about the scene in each
facilities field of view, and taking advantage of its cyber secure ability to recognize people,
objects and activity—especially in high resolution video—greatly enhance the operational value
over traditional video systems.
 Container/package screening
 Explosive Recognition/IED awareness
 Security Checkpoint Operations
 Vehicle search techniques
The combined solution not only has the operational value of video information grown greatly,
but the ability to protect that information has grown as well. The use of advanced information
technology security techniques ensures that only authorized personnel can access specific
video information, regardless of whether they have local, mobile or remote access.
About SmartTech™
Images and audio are transmitted over a secure customer-provided internet link to the MSA
SmartTech™ Emergency Operations Center where bomb technicians assist with analysis. This
remote screening support capability prevents unnecessary evacuations of your facilities and is
used in more than 30 countries around the world today by banks, government agencies,mailand
cargo screening as well as major defense and commercial organizations.
Consultation with MSA’s Emergency Operations Center prior to making a critical decision:
 Eliminates expensive disruptions to business
 Eliminates unnecessary evacuations
 Enhances the security of your business & safety of your employees
SmartTech™ bomb technicians are individuals
of unquestionable integrity who display a
mature attitude and exercise good judgment.
Each bomb technician has a background that
includes a minimum of 15 years of experience
in law enforcement, and five years of bomb
squad service. All SmartTech™ bomb
technicians are graduates of the Federal
Bureau of Investigation (FBI) Hazardous
Devices School and are members of the
International Association of Bomb Technicians
and Investigators.
Screenersupport instructionalon average consists of a two-hour didactic presentation followed
by a “hands-on” session at an X-ray within the client’s facility. Hands-on time is dictated by class
size and students’ grasp of concepts and abilities, and may last up to 6 hours.
This particular course is designed for an entry level X-ray screener who is tasked with operating
an X-ray machine in a corporate or government mailroom or at a check point screening station.
MSA provides semi-annual training and tailors curriculum to Agency specific needs. Training is
designed to refresh screeners’ knowledge of basic X-ray operation and image interpretation, and
subsequently explore more advanced screening procedures.
All of our instructors possess the demonstrated experience in security screening operations to
include the utilization of security screening equipment, which includes but is not limited to, x-ray
screening machines, walk-through metal detectors and handheld metal detectors.
Recently at the Pentagon for instance, MSA provided training adapted for the specific make and
model of The Pentagon Force Protection Agency’s X-ray machines. We were able to provide the
screener with an overview of explosives,the makeup and composition of an improvised explosive
device, as well as basic X-ray interpretation in addition to the use of standard or more complex
detection equipment.
Sample Learning Objective(s):
1. Understand threats to client’s facilities froman improvised explosive device (IED).
2. Understand the basics of explosive dynamics.
3. Identify and describe the components of an IED through x-ray interpretation.
4. Comprehensive review of X-ray machine operation.
5. Practical application exercises.
About CHAVE™
CHAVE™ is the most advanced IP Video solution on the market today meeting FIPS 201-2 level 3
certification and digital certificates from trusted certificate authorities to establish trust among
enterprise cameras and video surveillance applications.
Using CHAVE™ devices communicating with other devices cannot be intercepted due to
advanced cyber security techniques known as public key infrastructure (PKI) and strong digital
encryption.
Figure 1-3 Demonstrates examples of images MSA Security sees every day. MSA instructors
are the leading experts in Explosive Detection and High Consequence Mitigation.
CHAVE is a registered trademark of SecureXperts.
For additional information, please contact
Darnell Washington, President/CEO- SecureXperts
dwashington@securexperts.com
877-230-7911
Drew Halldorson, Senior Director Federal – MSA Security
ahalldorson@msasecurity.net
410-991-9804
MSA Security
11710 Plaza America Drive, Suite 2000
Reston, VA 20190
www.MSASecurity.net

More Related Content

What's hot

A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superwormUltraUploader
 
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFT
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFTCyber_range_whitepaper_cbr_070716_FINAL_DRAFT
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFTCourtney Brock Rabon, MBA
 
Cylance_Protect_Datasheet
Cylance_Protect_DatasheetCylance_Protect_Datasheet
Cylance_Protect_DatasheetTiana Henriks
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9ITpreneurs
 
Chapter 12 protection_mechanisms
Chapter 12 protection_mechanismsChapter 12 protection_mechanisms
Chapter 12 protection_mechanismshusseinalshomali
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...CRAW CYBER SECURITY PVT LTD
 
Physical Security Jan 16
Physical Security Jan 16Physical Security Jan 16
Physical Security Jan 16Rama Murthy
 
Exams4sure Juniper JN0-1332 Exam Dumps 2021
Exams4sure Juniper JN0-1332 Exam Dumps 2021Exams4sure Juniper JN0-1332 Exam Dumps 2021
Exams4sure Juniper JN0-1332 Exam Dumps 2021bronxfugly43
 

What's hot (8)

A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superworm
 
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFT
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFTCyber_range_whitepaper_cbr_070716_FINAL_DRAFT
Cyber_range_whitepaper_cbr_070716_FINAL_DRAFT
 
Cylance_Protect_Datasheet
Cylance_Protect_DatasheetCylance_Protect_Datasheet
Cylance_Protect_Datasheet
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
Chapter 12 protection_mechanisms
Chapter 12 protection_mechanismsChapter 12 protection_mechanisms
Chapter 12 protection_mechanisms
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
 
Physical Security Jan 16
Physical Security Jan 16Physical Security Jan 16
Physical Security Jan 16
 
Exams4sure Juniper JN0-1332 Exam Dumps 2021
Exams4sure Juniper JN0-1332 Exam Dumps 2021Exams4sure Juniper JN0-1332 Exam Dumps 2021
Exams4sure Juniper JN0-1332 Exam Dumps 2021
 

Similar to ASISwhitepaper[2]

Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services IntroCruatech
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copyevsrao
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017Riaan Bellingan
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Dr. Idris Ahmed
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakMarc St-Pierre
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...IJECEIAES
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
Information technology and information security services
Information technology and information security servicesInformation technology and information security services
Information technology and information security servicesDejan Majkic
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveDawn Nash Pfeiffer
 
Bhadale Group of Companies -Defense Academy Ver. 2.0
Bhadale Group of Companies -Defense Academy Ver. 2.0Bhadale Group of Companies -Defense Academy Ver. 2.0
Bhadale Group of Companies -Defense Academy Ver. 2.0Vijayananda Mohire
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek chan
 

Similar to ASISwhitepaper[2] (20)

Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
File1
File1File1
File1
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Information technology and information security services
Information technology and information security servicesInformation technology and information security services
Information technology and information security services
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
 
Bhadale Group of Companies -Defense Academy Ver. 2.0
Bhadale Group of Companies -Defense Academy Ver. 2.0Bhadale Group of Companies -Defense Academy Ver. 2.0
Bhadale Group of Companies -Defense Academy Ver. 2.0
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
 
Hayat Resume-1
Hayat Resume-1Hayat Resume-1
Hayat Resume-1
 

ASISwhitepaper[2]

  • 1. Use Case: CHAVE™ and Smart Tech™ Explosives Detection Advancements in IP video surveillance technologies—such as video analytics, license plate recognition, sensor and alert integration, behavior analytics and explosives detection—have created cost effective, scalable solutions that are highly desired worldwide for their force multiplication benefits and for increases in operational effectiveness. Increasing operational effectiveness and reducing total cost of ownership for critical infrastructure protection and mission critical operations is imperative as a Homeland Security national priority. SecureXperts and MSA Security, along with technology partners Bosch Security Services and Genetec have developed an integration utilizing secure IP video cameras and recording systems to provide scene analysis of suspicious images fromX-ray machines anywhere in the world to the MSA Emergency Operations Center (EOC) in New York City for real-time analysis by explosives detection Subject Matter Experts (SMEs). MSA developed SmartTech™ as a way to enhance X-ray screening operations by providing immediate access to experienced bomb technicians. SmartTech™ is a DHS Safety Act Certified three tier web based system that can be linked to any X-ray machine being used to screen for prohibited items. If an X-ray screener sees something suspicious or unusual during the interpretation process, the operator can request a subject matter expert to assist them in real time with the simple press of a button using our remote imaging capability that attaches to Smiths Detection, Rapiscan, Astro Physics machines both traditional, as well as cargo and Eagle Gantry type machines. Using SmartTech™ and CHAVE™ enabled cameras can now learn about the scene in each facilities field of view, and taking advantage of its cyber secure ability to recognize people, objects and activity—especially in high resolution video—greatly enhance the operational value over traditional video systems.  Container/package screening  Explosive Recognition/IED awareness  Security Checkpoint Operations  Vehicle search techniques
  • 2. The combined solution not only has the operational value of video information grown greatly, but the ability to protect that information has grown as well. The use of advanced information technology security techniques ensures that only authorized personnel can access specific video information, regardless of whether they have local, mobile or remote access. About SmartTech™ Images and audio are transmitted over a secure customer-provided internet link to the MSA SmartTech™ Emergency Operations Center where bomb technicians assist with analysis. This remote screening support capability prevents unnecessary evacuations of your facilities and is used in more than 30 countries around the world today by banks, government agencies,mailand cargo screening as well as major defense and commercial organizations. Consultation with MSA’s Emergency Operations Center prior to making a critical decision:  Eliminates expensive disruptions to business  Eliminates unnecessary evacuations  Enhances the security of your business & safety of your employees SmartTech™ bomb technicians are individuals of unquestionable integrity who display a mature attitude and exercise good judgment. Each bomb technician has a background that includes a minimum of 15 years of experience in law enforcement, and five years of bomb squad service. All SmartTech™ bomb technicians are graduates of the Federal Bureau of Investigation (FBI) Hazardous Devices School and are members of the International Association of Bomb Technicians and Investigators. Screenersupport instructionalon average consists of a two-hour didactic presentation followed by a “hands-on” session at an X-ray within the client’s facility. Hands-on time is dictated by class size and students’ grasp of concepts and abilities, and may last up to 6 hours.
  • 3. This particular course is designed for an entry level X-ray screener who is tasked with operating an X-ray machine in a corporate or government mailroom or at a check point screening station. MSA provides semi-annual training and tailors curriculum to Agency specific needs. Training is designed to refresh screeners’ knowledge of basic X-ray operation and image interpretation, and subsequently explore more advanced screening procedures. All of our instructors possess the demonstrated experience in security screening operations to include the utilization of security screening equipment, which includes but is not limited to, x-ray screening machines, walk-through metal detectors and handheld metal detectors. Recently at the Pentagon for instance, MSA provided training adapted for the specific make and model of The Pentagon Force Protection Agency’s X-ray machines. We were able to provide the screener with an overview of explosives,the makeup and composition of an improvised explosive device, as well as basic X-ray interpretation in addition to the use of standard or more complex detection equipment. Sample Learning Objective(s): 1. Understand threats to client’s facilities froman improvised explosive device (IED). 2. Understand the basics of explosive dynamics. 3. Identify and describe the components of an IED through x-ray interpretation. 4. Comprehensive review of X-ray machine operation. 5. Practical application exercises. About CHAVE™ CHAVE™ is the most advanced IP Video solution on the market today meeting FIPS 201-2 level 3 certification and digital certificates from trusted certificate authorities to establish trust among enterprise cameras and video surveillance applications. Using CHAVE™ devices communicating with other devices cannot be intercepted due to advanced cyber security techniques known as public key infrastructure (PKI) and strong digital encryption. Figure 1-3 Demonstrates examples of images MSA Security sees every day. MSA instructors are the leading experts in Explosive Detection and High Consequence Mitigation.
  • 4. CHAVE is a registered trademark of SecureXperts. For additional information, please contact Darnell Washington, President/CEO- SecureXperts dwashington@securexperts.com 877-230-7911 Drew Halldorson, Senior Director Federal – MSA Security ahalldorson@msasecurity.net 410-991-9804 MSA Security 11710 Plaza America Drive, Suite 2000 Reston, VA 20190 www.MSASecurity.net