Rapidsoft Systems (http:///www.rapidsoftsystems.com) is a leading outsourced software development, and IT service company based in NJ with offices in the US, India and Middle East. In the last 10 years, our team has produced over 400+ successful projects including numerous prestigious mobile and web apps for big corporations.
Rapidsoft Systemd also offers Defentect, an integrated advanced system for Detecting Chemical, Biological, Radiological, Nuclear and Explosive (CBRNE) Threats proactively. This sensor based system can provide pro-active threat detection from terrorists and save lives.
This presentation provides some information about Defentect CBRNE safety System. If you are looking for security and safety of homelan, contact us at +1 609 439 4775 for more information.
Defentect is an advanced CBRN threat detection system marketing by Rapidsoft Systems Inc. (http://www.rapidsoftsystems.com). It is only system of its kind that can save lives by detecting threats before they occur.
A TSCM presentation that we provide to stakeholders. If you would like us to speak please provide a 4 hour time period and we will schedule your briefing.
Security has been a big issue for civil aviation for decades. Airports and aircrafts are susceptible targets for terrorist attacks. The list of incidents is extensive and gets longer every year despite strict security measures.
Aviation has become the backbone of our global economy bringing people to business, tourists to vacation destinations and products to markets.
Statistically flying remains the safest mode of travelling compared to other modes of transportation. Yet significant threat continues to exist. Terrorists and criminals continue in their quest to explore new ways of disrupting air transportation and the challenge to secure airports and airline assets remain real. This calls for greater awareness of security concerns in the aviation sector.
“Protecting this system demands a high level of vigilance because a single lapse in aviation security can result in hundreds of deaths, destroy equipment worth hundreds of millions of dollars, and have immeasurable negative impacts on the economy and the public’s confidence in air travel.”
—Gerald L. Dillingham, United States General Accounting Office, in testimony before the Subcommittee on Aviation, Committee on Commerce, Science, and Transportation, U.S. Senate, April 6, 2000.
Insights from David Alexander ICAO AVSEC Pm and General Manager: AVSEC at Professional Aviation Security on current aviation security challenges including recent airport attacks and providing some possible practical solutions
Each week DroneSec releases a summary of the last week's incidents and reports regarding drone security.
This edition is free for public use. To receive similar reports like these, subscripe here: https://dronesec.com/pages/dronesec-notify
To view the Threat Intelligence platform, view more information here: https://dronesec.com/pages/notify
Defentect is an advanced CBRN threat detection system marketing by Rapidsoft Systems Inc. (http://www.rapidsoftsystems.com). It is only system of its kind that can save lives by detecting threats before they occur.
A TSCM presentation that we provide to stakeholders. If you would like us to speak please provide a 4 hour time period and we will schedule your briefing.
Security has been a big issue for civil aviation for decades. Airports and aircrafts are susceptible targets for terrorist attacks. The list of incidents is extensive and gets longer every year despite strict security measures.
Aviation has become the backbone of our global economy bringing people to business, tourists to vacation destinations and products to markets.
Statistically flying remains the safest mode of travelling compared to other modes of transportation. Yet significant threat continues to exist. Terrorists and criminals continue in their quest to explore new ways of disrupting air transportation and the challenge to secure airports and airline assets remain real. This calls for greater awareness of security concerns in the aviation sector.
“Protecting this system demands a high level of vigilance because a single lapse in aviation security can result in hundreds of deaths, destroy equipment worth hundreds of millions of dollars, and have immeasurable negative impacts on the economy and the public’s confidence in air travel.”
—Gerald L. Dillingham, United States General Accounting Office, in testimony before the Subcommittee on Aviation, Committee on Commerce, Science, and Transportation, U.S. Senate, April 6, 2000.
Insights from David Alexander ICAO AVSEC Pm and General Manager: AVSEC at Professional Aviation Security on current aviation security challenges including recent airport attacks and providing some possible practical solutions
Each week DroneSec releases a summary of the last week's incidents and reports regarding drone security.
This edition is free for public use. To receive similar reports like these, subscripe here: https://dronesec.com/pages/dronesec-notify
To view the Threat Intelligence platform, view more information here: https://dronesec.com/pages/notify
Make Mobilization Work - Properly Implementing Mobile SecurityMichael Davis
From my presentation at Super Strategies, how to make mobilizaiton work in your organization. sadly, security is used as a reason to not implement mobile devices; however, I present the real threats in Mobile Security (Adapted from the great Veracode Mobile Security Presetnation by Chris Wysopal (with permission)). I then provide details on what Mobile Device Management is, how it works, and how it compares to other options.
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
My talk will be about drone threats in general and how you can assess drone based threats. I will show the comprehensive threat assessment methodology and the countermeasures you can take against the drone threat. The threat assessment is based on a catalog of about 140 items. Particularly interesting will be looking at the drone threats in relation to:
Planting payload at specific locations (i.e. hacking equipment transported to target location for instance)
Tampering communication equipment with the help of drones
Insider threat communicate with an insider with the help of a drone
Hacking the communication of a drone
Privacy violations
etc.
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...DroneSec
Evangelos Mantas (Infili Intelligence)
Talk Recording: https://www.youtube.com/watch?v=W0ZNpj7QZtM
The Global Drone Security Network (GDSN) is the only event of its kind focusing on Cyber-UAV security, Drone Threat Intelligence, Counter-UAS, and UTM security. Watch the full recording here: https://www.youtube.com/watch?v=vZ6sRr65cSk
Speaker: https://www.linkedin.com/in/evangelos-mantas-0aa82619a/
DroneSec is a cyber-uav security and threat intelligence company who hosted this second series of the GDSN community event.
https://dronesec.com/
Protection of critical information infrastructureNeha Agarwal
Information Infrastructure is the term usually used to describe the totality of inter-connected computers and networks, and information flowing through them. Certain parts of this Information Infrastructure, could be dedicated for management / control etc of infrastructure providers’ e.g. Power generation, Gas/oil pipelines, or support our economy or national
fabric e.g. Banking / Telecom etc. The contribution of the services supported
by these infrastructures, and more importantly, the impact of any sudden
failure or outage on our National well being or National Security marks them as being Critical.
By extension, information infrastructure supporting the operations of Critical Infrastructure (CI) marks this as Critical Information infrastructure (CII). These Networks operate/monitor and control important Governmental and Societal functions and services including, but not limited to, Power (Generation/transmission/ distribution etc), Telecommunication (mobile/landline/internet etc), Transportation (Air/land/rail/sea etc), Defence etc. These CII are becoming increasingly dependent on their information infrastructure for information management, communication and control functions.
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...Nexie_verena
Guard booths, stations and shelters are defense strategy linchpins in most applications, and are becoming an increasingly integral part of the perimeter defense planning strategies of numerous organizations. Guard shelters are a first line of defense, allowing security personnel to function effectively as first-responders by defending assets, and alerting appropriate authorities through their chains-of-command. Once in place, the booths must function seamlessly day after day in frequently harsh environments.
Malware is a significant threat as it provides a way for an attacker to use your machine for nefarious means or take data from you and those connected to you. Learn how to combat this threat and protect yourself.
Incident Response (IR) and cleanup methodology to identify the scope of compromises, identify malicious scripts and programs to eradicate network systems.
Elite ISI is introducing the Remote Guarding Vendor Comparison Tool. Now, you can
compare Elite ISI with other monitoring and security competitors and see how we measure up to the task of
protecting your facilities.
Go to http://www.eliteinteractivesolutions.com to learn more.
Make Mobilization Work - Properly Implementing Mobile SecurityMichael Davis
From my presentation at Super Strategies, how to make mobilizaiton work in your organization. sadly, security is used as a reason to not implement mobile devices; however, I present the real threats in Mobile Security (Adapted from the great Veracode Mobile Security Presetnation by Chris Wysopal (with permission)). I then provide details on what Mobile Device Management is, how it works, and how it compares to other options.
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
My talk will be about drone threats in general and how you can assess drone based threats. I will show the comprehensive threat assessment methodology and the countermeasures you can take against the drone threat. The threat assessment is based on a catalog of about 140 items. Particularly interesting will be looking at the drone threats in relation to:
Planting payload at specific locations (i.e. hacking equipment transported to target location for instance)
Tampering communication equipment with the help of drones
Insider threat communicate with an insider with the help of a drone
Hacking the communication of a drone
Privacy violations
etc.
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...DroneSec
Evangelos Mantas (Infili Intelligence)
Talk Recording: https://www.youtube.com/watch?v=W0ZNpj7QZtM
The Global Drone Security Network (GDSN) is the only event of its kind focusing on Cyber-UAV security, Drone Threat Intelligence, Counter-UAS, and UTM security. Watch the full recording here: https://www.youtube.com/watch?v=vZ6sRr65cSk
Speaker: https://www.linkedin.com/in/evangelos-mantas-0aa82619a/
DroneSec is a cyber-uav security and threat intelligence company who hosted this second series of the GDSN community event.
https://dronesec.com/
Protection of critical information infrastructureNeha Agarwal
Information Infrastructure is the term usually used to describe the totality of inter-connected computers and networks, and information flowing through them. Certain parts of this Information Infrastructure, could be dedicated for management / control etc of infrastructure providers’ e.g. Power generation, Gas/oil pipelines, or support our economy or national
fabric e.g. Banking / Telecom etc. The contribution of the services supported
by these infrastructures, and more importantly, the impact of any sudden
failure or outage on our National well being or National Security marks them as being Critical.
By extension, information infrastructure supporting the operations of Critical Infrastructure (CI) marks this as Critical Information infrastructure (CII). These Networks operate/monitor and control important Governmental and Societal functions and services including, but not limited to, Power (Generation/transmission/ distribution etc), Telecommunication (mobile/landline/internet etc), Transportation (Air/land/rail/sea etc), Defence etc. These CII are becoming increasingly dependent on their information infrastructure for information management, communication and control functions.
Hardening the Perimeter:The Role of the Guard Booth,Security Solutions and Be...Nexie_verena
Guard booths, stations and shelters are defense strategy linchpins in most applications, and are becoming an increasingly integral part of the perimeter defense planning strategies of numerous organizations. Guard shelters are a first line of defense, allowing security personnel to function effectively as first-responders by defending assets, and alerting appropriate authorities through their chains-of-command. Once in place, the booths must function seamlessly day after day in frequently harsh environments.
Malware is a significant threat as it provides a way for an attacker to use your machine for nefarious means or take data from you and those connected to you. Learn how to combat this threat and protect yourself.
Incident Response (IR) and cleanup methodology to identify the scope of compromises, identify malicious scripts and programs to eradicate network systems.
Elite ISI is introducing the Remote Guarding Vendor Comparison Tool. Now, you can
compare Elite ISI with other monitoring and security competitors and see how we measure up to the task of
protecting your facilities.
Go to http://www.eliteinteractivesolutions.com to learn more.
Cybersecurity | D-fend: Counter drone solution for urban environmentsVertex Holdings
In this installment of our 9-part series, we feature our portfolio company, D-fend, a counter drone solution for securing a stationary perimeter and portable usage in urban environments.
No matter how skilled your IT staff are, they may never be able to cope with the challenges posed to your network by external/internal security threats unless they are formally trained in Network Security and Computer Forensics methods.Read more on the slide...
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
Mohamed Bedewi, Offense Security Division Head and Sr. Penetration Testing Consultant at DTS presented also during one of the security sessions titled - "Your Network in the Eyes of a Hacker – The 0ff3ns!v3 Version" which raised a few eyebrows to say the least. The presentation slides can be found here….
The first brochure for SMi Group's 3rd annual Oil & Gas Cyber Security conference & exhibition is here. Don't miss the Early Bird deadline and contact Alia Malick if you want to get involved.
TSCM - Technical Surveillance Counter Measures July 2017Riaan Bellingan
Almost all businesses have undoubtedly benefited from the internet, where products, services and marketing communications can reach vast audiences at relatively low costs - but this has also increased the chances of Intellectual Property theft.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THreats
1. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Defentect – A CBRNE Threat Detection System To Detect Terror Threats
Victory Falcon ET.
308-B BMI Building
Khalid Bin Walid Road
PO Box 27128, Dubai, UAE.
Phone: +971 4 3554055, Fax:+ 971 4 3552745
Rapidsoft Systems, Inc.
7 Diamond Ct,
Princeton Junction,
New Jersey 08550, USA
Phone (Sales):+1-609-439-4775
Brijesh Kumar, Ph.D.
COO an CSO, Rapidsoft Systems Inc.
Email: bkumar@rapidsoftsystems.com
+1 609 439 4775 (New jersey), USA
2. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Overview
March 2012
www.defentect.com and www.rapidsoftsystems.com
3. Who is Defentect ?
• Defentect, a publicly traded venture, in the USA
• It developed under its Chairman, Paul Bremer, the former
head of the civilian authority in Iraq
• It’s a touchstone in security matters and has developed a
platform for integration of surveillance devices and sensors
for detection and alerting to protect from Chemical,
Biological, Radiation, Nuclear & Explosive threats.
• Defentect’s flagship product is DM3
(Deter + Detect + Defend)
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
5. “Passing through airports is now such a tormented process the heart sinks as
you begin a journey. Remember when flying was fun?
How long ago that seems now…”
Threats: CBRNE
Result: Huge Security Expense: Scanners, Security Personnel,
Delays, Huge Recurring Expenditure
One Example: Aviation Sector
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
6. Currently Perceived Threats against Mass
Public and Sensitive Installations and
Structures
• Chemical
• Biological
• Radioactive
• Nuclear
• Explosives
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
7. Detection & Deterrance
• Detection of perceived threats in critical and public places are a
must.
• These detecting devices help in timely detection of threats and
providing safety to those in the area and they also help deter
criminals.
• They help in providing evidence for trials and make prosecutions
easier.
• They help in giving an extra advantage to the police and security
teams that patrol the areas.
• They give citizens extra peace of mind and feeling of safety
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
8. Why the Best Security Systems Fail
Reasons ?
Reason: The weak links in the security system..
• A Security personnel who is lacks education in modern chemical, electronics and nuclear
technology and it’s use by intruders.
• Incorrect interpretation & judgement of the threat signals by Security Personnel .
• A security personnel not present at the site of threat.
• Intruder intelligently distracts the security personnel and breaches the security
• A tired & inattentive security personnel.
Result:
• Missed noticing the threat
• Lack of accurate location of threat.
• Incorrect information of threat type.
• Lack of immediate and co-ordinated communication.
• Disconnected inputs lacks overview and interpretation of threat by the central command.
• Wrong judgement and delayed action.
Usually most of the Security Systems use sophisticated detectors and technology
and still fail. Why ?
9. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
9
What’s lacking in Current Systems ?
Chemical/Radiological/Visual Detection
• Labor intensive and expensive
• Require security guards to focus over
protracted time periods and respond manually
• Delayed alerts to authorities
• How well trained in physics, chemistry are
security personnel manning the computer
screens?
• An 8 hour shift does affect judgment.
• High incidence of innocent and false positive
alarms.
10. • Armed guards patrolling a perimeter, peering into
darkness, checking ID's.
• The roving guard isn't there when the terrorist races
across
• The guard is bored and inattentive because it is the
7th hour of his shift.
• He was bribed by what he thought were run-of-the-
mill smugglers to look the other way but who turned
out to be terrorists, as happened in Russia.
• The guard himself is a terrorist who has infiltrated the
security organization.
What’s lacking in Current Systems ?
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
12. Today we have advanced detectors alarm and
communication devices…
Scenario:
Disconnected Independent Detectors & Alarms Manned &
Monitored Continuously by Dedicated Security Personnel
Positive: A Good Deterrent & Reduces Threat Perception
Negatives:
Threat Interpretation by an Individual
Possibility of Wrong Judgement
Delayed or No relay of Threat to Central Command
Disconnected & Uncoordinated Action
Is it Effective ?
Yes to a good extent ! BUT can be made BETTER
13. What’s the Solution
• We need an Intelligent Integrated Solution
comprising all known threat sensors.
(Video, Audio & CBRNE)
• Continuous Intelligent Monitoring
• Independent of an individual’s security personnel’s
alertness, intelligence, knowledge and judgement.
• Alerts all concerned immediately wherever they are.
• Assists the Personnel and Management in making
quick decisions
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
14. What is Defentects business?
• Defentect offers a global management and alerting system which reacts to the
detection of chemical, biological, radiological, nuclear and explosive (“CBRNE”)
threats.
• Defentect’s proprietary technology detects the threat and immediately notifies
key personnel and first responders so that appropriate action can be taken. The
software platform is easily integrated with other sensors, making it attractive to
many potential partners and manufacturers.
• Defentect’s products and technologies are intended for use in risk management
operations for a wide range of international businesses and locations, including
the 100,000 sites in the US that are listed as “critical infrastructure” by the
Department of Homeland Security.
• Some key targets include but are in no way limited to hospitals and research labs,
military and government facilities, border entry points, and public venues such as
airports, sport arenas, malls etc.
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
15. Why Defentect ?
DM3 is the only product which has below unique features:
integrating broadly deployed radiation and other sensors
flexible messaging to alert multiple recipients of dangerous
radiological, chemical and other hazardous exposures for
nuclear power plants, hospitals, and other high-value targets.
The system protects and defends by sending real-time
notifications to multiple pre-designated security command
centers when the presence of threat-level exposure to
radiation, chemicals, or other hazards has been detected.
The integrated Defentect DM3 system enables customers to
keep adding other threat event detection capabilities to their
security systems.
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
16. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Defentect DM3
Proven threat awareness solution
• Developed Under Expert Guidance with Years of Experience in the
Security Industry
• Installed, operational and proven in “high value” target facilities in
the US.
• Gathers data from virtually any sensor which can live on a data
network.
• Seeks and identifies anomalies in the data.
• Forwards the new information to an unlimited number of devices on
any platform capable of receiving messages: SMS, email,
smartphones, voicemail, XML.
• All instantaneously and independent operating personnel.
16
17. DM3 Applications
Deter
• Defentect can be deployed in critical government & public venues, transit points,
financial, industrial as well as various government and military facilities.
Detect
• Locating Defentect at transportation choke points provides the opportunity to detect
the illicit movement of various material and assist in thwarting a terrorist attack.
These transit sites include border entries; mass transit hubs such as airports subway
and train stations; transit infrastructure including weigh stations, bridges and toll
booths, ports and private facilities such as truck stops, marinas, gas stations and
public storage facilities.
Defend
• Potential targets for a dirty bomb attack represent the third type of location for
Defentect deployment. These include commercial buildings, shopping malls, sports
venues, entertainment centers, landmarks and tourist sites, critical infrastructure and
financial institutions, as well as government and military locations.
Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
18. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Why Defentect DM3
• Precise, uniform, predictable response without
relying upon personnel training or loyalty.
• Trained personnel is out in the field patrolling,
not sitting in a darkened room looking at a
computer screen.
• Elimination of variable response from different
security personnel.
18
19. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
19
• Integrated & Intelligent threat detection system that precisely monitor and
reduce or eliminate misdiagnosis.
• Defentect’s DM3™ software is the management, monitoring and messaging
component that networks to third party sensors, providing administrative and
configuration services for a variety of threat-event detection demands.
• Defentect has unique, low cost, integrated, networked, ubiquitous,
wide area, unmanned software architecture and sensor technologies that meet
this need.
• Our intellectual property is built upon readily available electro-optical devices.
• Defentect’s products graft readily onto existing security systems, minimizing
adoption costs and facilitating market penetration.
Why Defentect DM3
20. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
Defentect DM3
Precise and Predictable Security Independent of Personnel
20
Examples of what DM3 can do:
• DM3 can automatically cause video cameras to rotate to cover an
entrance when a radiological threat is detected at that entrance
without the need for human action.
• DM3 can add sensors as easily as clicking on a website for
instantaneous and continually changing security.
• DM3 can pull up data from computer data banks so that when
DM3 delivers the pre-specified warning message data from the
data storage banks can be sent along as well
21. DM3 Integrates all the Sensors & Detectors into an
Intelligent System
Net Result
Less nos of Security Personnel
Immediate & Correct Threat Detection
Centraliized & Co-ordinated Action Plan
Quick Action
Central Command
23. IMPLEMENTATION
THREAT & VULNERABILITY ASSESSMENT
• Defentect starts with a risk-based threat and vulnerability assessment (TAVA) of the assett.
• TAVA identifies highest level of protection possible for that assett.
• Defentect then works with the stakeholders to design an integrated CONOPS (Concept of Operations)
• Maximizing the value of the networked threat detection technologies, existing building operations, security
systems and personnel resources.
COMMISSIONING
• System commissioning involves installing the software & hardware
• Bringing the system online and challenging the system
TRAINING
• Defentect delivers training customized to the CONOPS and SOPs (Standard Operating Procedures).
• Field exercises are conducted to validate the CONOPS and verify the effectiveness of the training.
RESPONSE SERVICES
• Defentect can develop and implement response protocols which may include building control system
modifications.
• Our approach distinguishes hoaxes from real events and prevents disruption, while maximizing protection of
occupants and physical assets.
24. Venues Requiring Attention
• 12 Areas have been identified as Critical Infrastructures requiring protection from threats. These
infrastructures provide the goods and services that contribute to the national defense and strong economy.
The reliability, survivability, and resiliency of these systems allow citizens to maintain a sense of confidence in
their country and themselves. These infrastructures identify the quality of life.
• Government -The government itself can be viewed as a critical infrastructure, with its ability to command
and control the response to any attack, terrorist or natural to any of our infrastructures
• Defense Systems addressing its dependency on the Defense Industrial Base, and is taking the issues of
private industry into its critical infrastructure protection efforts
• Emergency Services -Unfortunately past and present, foreign and domestic, experiences indicate that
emergency services response infrastructure and personnel can be the target of deliberate direct or secondary
attacks
• Public Transportation -The area includes aviation, rail, pipelines, highways, trucking and bus, and public
mass transit. The scope of the transportation sector makes it critical to both our economy and national
security.
• Petroleum & Chemical Industry -The sector is also a lucrative terrorist target due environmental impact
from the physical destruction of many of its site
• Electricity Plant Infrastructure is required to operate and maintain homes, hospitals, schools, businesses
and industrial plants; it is also necessary to refine oil. Disruption of electrical flow or a power grid would
impact the economy and defense as well as response and recovery.
• Public Health -This area consists of state/local health departments, hospitals, health clinics, mental health
facilities, laboratories, mortuaries, and pharmaceutical stockpiles. All of these would be critical after any form
of attack or natural event
• Banking and Finance -The financial sectors infrastructure includes computer networks, storage devices and
telecommunications networks. This sector is also extremely vulnerable to public perception; an impression
of weakness could easily result in a damaging cascading effect
• Post Office- Anthrax attacks through the postal system cause mail stoppages
25. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
25
Pilots & Disaster Response Training
Exercises
• Participant in Operation Golden Phoenix Federal terrorism response
laboratory, San Diego, with U.S. Department of Homeland Security
Customs and Border Protection, U.S. Marine Corps Aircraft Group
46, DOD, DEA, FBI, DOJ, DOE
• At Golden Phoenix, Defentect monitored threat-level radiation at
Brown Field Airport and Scripps Memorial Hospital La Jolla
Among installations:
• AIT Worldwide Logistics, Itasca, IL, a global transportation provider
• Bethesda Medical Center, premier Washington Hospital Center for
all senior civilian/military in D.C.
28. Presented by: Victory Falcon ET. Dubai UAE
Tel: + 971 4 3554055, vicmea@eim.ae
28
Competition in Radiological Sensors
Company Product Functionality Remote
Alerting
Isotope
ID
Sensors per
System
Defentect Group Defentect Ethernet based
radiation detection
Yes Yes Unlimited
ICx Technologies webMATE Ethernet based multi-
channel analyzer.
Sensors detect CBRNE
Yes Yes Unlimited
RAE Systems AreaRAE Wireless multi-gas &
gamma radiation
detector
Yes. Up to 2
miles from
device
No Stand alone sensor or
up to 32 if purchase
ProRAE software
Canberra Falcon 5000 Portable radiation
detector. Detects
location, amount and
isotope
Between
detector and
control unit
ONLY
Yes Stand alone sensor
Thermo Fisher Scientific Viewpoint and
standalone
gamma sensors
Remote monitoring
software. Integrates
company & 3rd party
sensors with plug in
Yes with
additional
purchase of
Viewpoint
Depends upon
sensor
Customizable and
scalable
Polimatrix Radflash Handheld radiation
detector
No Yes Stand alone
Berkeley Nucleonics Rad-D, AreaSAM
1710 radRAM
Rad-D and 1710 radRAM
detect either gamma or
neutron. AreaSAM is a
direct competitor
No AreaSAM
only
AreaSAM allows up to
100 nodes, each node
encompassing multiple
detectors
Editor's Notes
This diagram outlines the system components…
DefenTect
GammaTect Sensors
GammaTect-Plus
Alert engine
Integration with other security systems