SlideShare a Scribd company logo
1 of 4
Download to read offline
Lomiss Secure
Market Challenge

One of the main challenges in every emergency/security/anti terror event is the gathering, analysis and
distribution of intelligence and tactical information based on the different profiles of the operational
participants in the event (e.g. police, fire brigade, medical teams etc.) each profession requires a different
set of information in order to complete his tasks. That said, the challenge is to optimize the decision making
process by delivering precise relevant information to each function in the operational chain.
At present, information can be received from multiple sources such as sensors, which can range from cellular
devices, to dedicated state of the art information gathering systems, real time Human Intelligence and much
more. The information can be visual, audio, IR etc. Another source of information is the organizational
data warehouse that may contain structural blueprints, photos, license plate numbers, vehicle information,
persomal files and other data which can be sent in real time to all field operatives and assist them in the
descision making process and completion of their tasks.
Having said that, the task of managing multiple flows of information based on time, position and user role
(profile) poses a new challenge and opportunity in the field of Command and Control (C&C). the proposed
system should have the capability of directing relevant information to the proper C&C operative in order to
be analyzed and facilitate a decision on how to act upon receiving this information.
Information security and privacy poses the second major challenge when dealing with security information
and data. The data should be protected all along the system flow, on the server over the air and at the
operational endpoint. At any given moment any information has to be protected making sure it doesn’t get
to the wrong hands.


LOMISS SECURE
The Lomiss Secure System (LSS) is designed with the        C&C benefits from the system on various levels.
operational Command & Control process in mind.             Starting from the GIS integration that can display
The systems main philosophy is to connect a remote         the location of each operative, real time textual (and
operative to necessary data on location, according to      visual) data from selected endpoints and more. The
the operator profile (e.g. medic, firefighter, assault     Lomiss Report Generator (LRG) which can deliver
team, negotiator, scene commander etc.) and in real        data and analysis on multi levels and cross-sections
time, meaning that each operator can gain access to        improving debriefing and event summation. Through
all relevant data required to take an effective, correct   the cross connection with organizational databases
and professional decision on location and in real          accumulating data for future events.
time. The system is designed to give each function         All of the above deliver’s an improved quality of op-
in the operational chain the possibility to contribute     erational readiness, chain of operation and decision
information/intelligence in real time in order to          making.
improve the decision making and operational process.
This is done using a smart and easy to use interface
that requires minimal intervention from the operative
and without using any voice interface which is much
harder to secure.

        contact@lomiss.com        www.lomiss.com
Features and Benefits
End Point (operative system)                           Server
•   Real-time access to data – according to pro        •   Real-time connections to multiple back-end data
    fession and location                                   bases via Lomiss System Gateway (LSG)
•   Real-time reporting to C&C using a GUI and not a   •   Advanced reporting capabilities using Lomiss
    voice channel                                          Report Generator (LRG)
•   Real-time database update                          •   GIS integration
•   Real-time automated reporting                      •   Advanced management tools using Lomiss Man-
                                                           agement station (LMS) including :
•   State-of-the-art data security system
                                                           •    Association and relation of event information
•   Route optimization                                          to multiple operational units from different
•   Directions and navigation                                   professions (medic, firefighter, assault team,
                                                                negotiator, scene commander, etc.)
•   Intuitive interface
                                                            • Full definition and profiling of operational
•   For use on most 2.75G and higher smart phones               unit required data
                                                            • Command delivery through a data link elimi-
                                                                nating radio use and conjunction
                                                            • Dynamic archiving - archive any piece of
                                                                information for future use (e.g. knowledge
                                                                base)
                                                            • Burst into operator
                                                       •   Automatic location based on GPS location
                                                       •   Data security and privacy. No information resides
                                                           at the end point at any given moment
                                                       •   Operational unit monitoring and control
                                                       •   Improve organizational efficiency and creating a
                                                           unified reporting structure




                          System Structure




            contact@lomiss.com        www.lomiss.com
Example Scenario
Let’s take, for example, An all-too common scenario which may serve for illustration: A barricaded suspect


     Stage              SWAT              Firefighters        Paramedics             negotiator            Command
                                                                                                             center
Stage 1:           On route.            On route.           On route.              On route.             Retrieves data
First police of-   Receives through     Receives through    Receives through       Receives through      from databases
ficer arrives to   the Lomiss           the Lomiss sys-     the Lomiss sys-        the Lomiss sys-       – municipal, law
the scene. He      system the area      tem the house       tem the house          tem the kidnap-       enforcement,
then makes first   data, house blue-    blueprints and      blueprints,            per criminal and      weather, coordi-
contact with the   prints, informa-     materials, near-    medical data           personal data         nates and pri-
kidnapper. And     tion regarding       est hose connec-    of hostages (if                              oritize all teams
gathers initial    the surrounding      tions, possible     possible) near-                              arriving to the
information/       environment          hazardous ma-       est evacuation                               scene in order to
intelligence and   (possible sniper     terials on site,    points (hospitals                            avoid confusion
transfers it to    location, possible   weather forecast    etc.) and routes                             using the GIS
the C&C via the    mobile command       and wind direc-     (if possible with                            module etc.
Lomiss end point   post etc.) and the   tions               traffic informa-
                   kidnapper crimi-                         tion)
                   nal and personal
                   data
Stage 2:           Snipers and spot-    Receives infor-     Receives infor-        Receives status       Receives intelli-
The SWAT, Fire-    ters report intel-   mation to Lo-       mation to Lo-          updates, psycho-      gence and infor-
fighters and       ligence and visual   miss End Point      miss End Point         logical profile and   mation from all
Paramedics ar-     to C&C through       regarding status    regarding status       any personal data     units and infor-
rive to the scene. the Lomiss End       updates, weather    updates to hos-        he needs for the      mation sources.
Operational cycle Point based           changes, location   tages, location,       completion of         Automatically
begins             on predefined        and direction of    injuries, gen-         negotiation. Pos-     updates status
                   forms and pro-       doors and win-      eral status, size of   sibility of opening   via predefined
                   tocol. Various       dows and other      doors and other        a dedicated chan-     protocol and
                   ways to transfer     predefined infor-   predefined infor-      nel with relevant     profile to all
                   information (e.g.    mation needed       mation needed          personal (phsicol-    units. If needed
                   live video feed,     by protocol.        by protocol.           ogy)                  c&c bursts to any
                   photos, built in     Report to c&c as    Report to c&c if                             unit with specific
                   reporting etc.)      required            need                                         information




             contact@lomiss.com     www.lomiss.com
Stage              SWAT           Firefighters      Paramedics          negotiator         Command center
 Stage 3:          Spotters see kid-
                                  Receives status       Receives status   Recieves update     Receives the report
 Kidnapper         napper moving  updates and           updates and       from spotters.      process and transfer
 spotted mov-      in the house and
                                  ready com-            ready com-        Distracts kidnapper ready command to
 ing to kitchen    reports to c&c mand from             mand from         and gives breach    firefighters and med-
 leaving hostag-   Throuogh the   c&c throuogh          c&c throuogh      command through     ics updates peripheral
 es unattended     Lomiss End Point
                                  the Lomiss End        the Lomiss End    Lomiss End Point    units and collabora-
                                  Point                 Point                                 tors (hospitals etc.)
 Stage 4: SWAT Breaches in.       Move into fire        Move into         Gets live feed from Collects all data com-
 breaches and Spotters transfer fighting posi-          evacuation        spotters to the     mands and prioritizes
 neutralizes the real time vi-    tion leader           position          Lomiss End Point    entry sequence (fire-
 kidnapper and sual to c&c, swat gets live feed                           continues distrac- fighters, medics, and
 release the     leader and fire- through Lomiss                          tion of kidnapper   negotiator). Reports
 hostages        fighters leader  End point                                                   to peripheral units




About Lomiss
Lomiss is an Israeli High Tech company specializes in location based systems.
The company has developed products which enables the near real time management and secure data reporting of a
large work force working in distributed locations. The system has been created utilizing a sophisticated data transfer
security mechanism and is therefore best suited best for the healthcare and homeland security verticals. The system
uses concepts adapted from Israeli military Command & Control systems.
Lomiss founders come from a broad background of business development, project management and multi million dol-
lar projects in the media, telecommunication and security sectors
              contact@lomiss.com       www.lomiss.com

More Related Content

Viewers also liked

Lomiss English V 2
Lomiss English V 2Lomiss English V 2
Lomiss English V 2Assaf Landau
 
Perspective
PerspectivePerspective
Perspectivej Nourry
 
Jurnal bahasa indonesia
Jurnal bahasa indonesiaJurnal bahasa indonesia
Jurnal bahasa indonesiabesus
 
Temperate grasslands
Temperate grasslandsTemperate grasslands
Temperate grasslandssparkshinx
 

Viewers also liked (6)

Lomiss English V 2
Lomiss English V 2Lomiss English V 2
Lomiss English V 2
 
Lomiss Home Care
Lomiss Home CareLomiss Home Care
Lomiss Home Care
 
Uranus
UranusUranus
Uranus
 
Perspective
PerspectivePerspective
Perspective
 
Jurnal bahasa indonesia
Jurnal bahasa indonesiaJurnal bahasa indonesia
Jurnal bahasa indonesia
 
Temperate grasslands
Temperate grasslandsTemperate grasslands
Temperate grasslands
 

Similar to Lomiss Secure Final

Introduction to Offensive Security.pptx
Introduction to Offensive Security.pptxIntroduction to Offensive Security.pptx
Introduction to Offensive Security.pptxMaaitrayoDas
 
Mine communication sysetms
Mine communication sysetmsMine communication sysetms
Mine communication sysetmsVR M
 
Fog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsFog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsReal-Time Innovations (RTI)
 
2005 issa journal-simsevaluation
2005 issa journal-simsevaluation2005 issa journal-simsevaluation
2005 issa journal-simsevaluationasundaram1
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security IntelligenceSplunk
 
Topic Since information extracted from router or switch interfaces.docx
Topic Since information extracted from router or switch interfaces.docxTopic Since information extracted from router or switch interfaces.docx
Topic Since information extracted from router or switch interfaces.docxjuliennehar
 
SoleraNetworks
SoleraNetworksSoleraNetworks
SoleraNetworksJoe Levy
 
Ciss previsionnotes
Ciss previsionnotesCiss previsionnotes
Ciss previsionnotesmadunix
 
Rhodium overview op
Rhodium overview opRhodium overview op
Rhodium overview opTim Jacobs
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring BasicsRob Dunn
 
Deep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilotDeep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilotServicePilot
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 

Similar to Lomiss Secure Final (20)

Introduction to Offensive Security.pptx
Introduction to Offensive Security.pptxIntroduction to Offensive Security.pptx
Introduction to Offensive Security.pptx
 
Mine communication sysetms
Mine communication sysetmsMine communication sysetms
Mine communication sysetms
 
Mine comm
Mine commMine comm
Mine comm
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Fog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsFog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of Things
 
2005 issa journal-simsevaluation
2005 issa journal-simsevaluation2005 issa journal-simsevaluation
2005 issa journal-simsevaluation
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security Intelligence
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
Topic Since information extracted from router or switch interfaces.docx
Topic Since information extracted from router or switch interfaces.docxTopic Since information extracted from router or switch interfaces.docx
Topic Since information extracted from router or switch interfaces.docx
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
SoleraNetworks
SoleraNetworksSoleraNetworks
SoleraNetworks
 
Ciss previsionnotes
Ciss previsionnotesCiss previsionnotes
Ciss previsionnotes
 
Rhodium overview op
Rhodium overview opRhodium overview op
Rhodium overview op
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
 
Deep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilotDeep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilot
 
MONITORING PPT.pdf
MONITORING PPT.pdfMONITORING PPT.pdf
MONITORING PPT.pdf
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
Correlog Overview Presentation
Correlog Overview PresentationCorrelog Overview Presentation
Correlog Overview Presentation
 

Recently uploaded

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Lomiss Secure Final

  • 1. Lomiss Secure Market Challenge One of the main challenges in every emergency/security/anti terror event is the gathering, analysis and distribution of intelligence and tactical information based on the different profiles of the operational participants in the event (e.g. police, fire brigade, medical teams etc.) each profession requires a different set of information in order to complete his tasks. That said, the challenge is to optimize the decision making process by delivering precise relevant information to each function in the operational chain. At present, information can be received from multiple sources such as sensors, which can range from cellular devices, to dedicated state of the art information gathering systems, real time Human Intelligence and much more. The information can be visual, audio, IR etc. Another source of information is the organizational data warehouse that may contain structural blueprints, photos, license plate numbers, vehicle information, persomal files and other data which can be sent in real time to all field operatives and assist them in the descision making process and completion of their tasks. Having said that, the task of managing multiple flows of information based on time, position and user role (profile) poses a new challenge and opportunity in the field of Command and Control (C&C). the proposed system should have the capability of directing relevant information to the proper C&C operative in order to be analyzed and facilitate a decision on how to act upon receiving this information. Information security and privacy poses the second major challenge when dealing with security information and data. The data should be protected all along the system flow, on the server over the air and at the operational endpoint. At any given moment any information has to be protected making sure it doesn’t get to the wrong hands. LOMISS SECURE The Lomiss Secure System (LSS) is designed with the C&C benefits from the system on various levels. operational Command & Control process in mind. Starting from the GIS integration that can display The systems main philosophy is to connect a remote the location of each operative, real time textual (and operative to necessary data on location, according to visual) data from selected endpoints and more. The the operator profile (e.g. medic, firefighter, assault Lomiss Report Generator (LRG) which can deliver team, negotiator, scene commander etc.) and in real data and analysis on multi levels and cross-sections time, meaning that each operator can gain access to improving debriefing and event summation. Through all relevant data required to take an effective, correct the cross connection with organizational databases and professional decision on location and in real accumulating data for future events. time. The system is designed to give each function All of the above deliver’s an improved quality of op- in the operational chain the possibility to contribute erational readiness, chain of operation and decision information/intelligence in real time in order to making. improve the decision making and operational process. This is done using a smart and easy to use interface that requires minimal intervention from the operative and without using any voice interface which is much harder to secure. contact@lomiss.com www.lomiss.com
  • 2. Features and Benefits End Point (operative system) Server • Real-time access to data – according to pro • Real-time connections to multiple back-end data fession and location bases via Lomiss System Gateway (LSG) • Real-time reporting to C&C using a GUI and not a • Advanced reporting capabilities using Lomiss voice channel Report Generator (LRG) • Real-time database update • GIS integration • Real-time automated reporting • Advanced management tools using Lomiss Man- agement station (LMS) including : • State-of-the-art data security system • Association and relation of event information • Route optimization to multiple operational units from different • Directions and navigation professions (medic, firefighter, assault team, negotiator, scene commander, etc.) • Intuitive interface • Full definition and profiling of operational • For use on most 2.75G and higher smart phones unit required data • Command delivery through a data link elimi- nating radio use and conjunction • Dynamic archiving - archive any piece of information for future use (e.g. knowledge base) • Burst into operator • Automatic location based on GPS location • Data security and privacy. No information resides at the end point at any given moment • Operational unit monitoring and control • Improve organizational efficiency and creating a unified reporting structure System Structure contact@lomiss.com www.lomiss.com
  • 3. Example Scenario Let’s take, for example, An all-too common scenario which may serve for illustration: A barricaded suspect Stage SWAT Firefighters Paramedics negotiator Command center Stage 1: On route. On route. On route. On route. Retrieves data First police of- Receives through Receives through Receives through Receives through from databases ficer arrives to the Lomiss the Lomiss sys- the Lomiss sys- the Lomiss sys- – municipal, law the scene. He system the area tem the house tem the house tem the kidnap- enforcement, then makes first data, house blue- blueprints and blueprints, per criminal and weather, coordi- contact with the prints, informa- materials, near- medical data personal data nates and pri- kidnapper. And tion regarding est hose connec- of hostages (if oritize all teams gathers initial the surrounding tions, possible possible) near- arriving to the information/ environment hazardous ma- est evacuation scene in order to intelligence and (possible sniper terials on site, points (hospitals avoid confusion transfers it to location, possible weather forecast etc.) and routes using the GIS the C&C via the mobile command and wind direc- (if possible with module etc. Lomiss end point post etc.) and the tions traffic informa- kidnapper crimi- tion) nal and personal data Stage 2: Snipers and spot- Receives infor- Receives infor- Receives status Receives intelli- The SWAT, Fire- ters report intel- mation to Lo- mation to Lo- updates, psycho- gence and infor- fighters and ligence and visual miss End Point miss End Point logical profile and mation from all Paramedics ar- to C&C through regarding status regarding status any personal data units and infor- rive to the scene. the Lomiss End updates, weather updates to hos- he needs for the mation sources. Operational cycle Point based changes, location tages, location, completion of Automatically begins on predefined and direction of injuries, gen- negotiation. Pos- updates status forms and pro- doors and win- eral status, size of sibility of opening via predefined tocol. Various dows and other doors and other a dedicated chan- protocol and ways to transfer predefined infor- predefined infor- nel with relevant profile to all information (e.g. mation needed mation needed personal (phsicol- units. If needed live video feed, by protocol. by protocol. ogy) c&c bursts to any photos, built in Report to c&c as Report to c&c if unit with specific reporting etc.) required need information contact@lomiss.com www.lomiss.com
  • 4. Stage SWAT Firefighters Paramedics negotiator Command center Stage 3: Spotters see kid- Receives status Receives status Recieves update Receives the report Kidnapper napper moving updates and updates and from spotters. process and transfer spotted mov- in the house and ready com- ready com- Distracts kidnapper ready command to ing to kitchen reports to c&c mand from mand from and gives breach firefighters and med- leaving hostag- Throuogh the c&c throuogh c&c throuogh command through ics updates peripheral es unattended Lomiss End Point the Lomiss End the Lomiss End Lomiss End Point units and collabora- Point Point tors (hospitals etc.) Stage 4: SWAT Breaches in. Move into fire Move into Gets live feed from Collects all data com- breaches and Spotters transfer fighting posi- evacuation spotters to the mands and prioritizes neutralizes the real time vi- tion leader position Lomiss End Point entry sequence (fire- kidnapper and sual to c&c, swat gets live feed continues distrac- fighters, medics, and release the leader and fire- through Lomiss tion of kidnapper negotiator). Reports hostages fighters leader End point to peripheral units About Lomiss Lomiss is an Israeli High Tech company specializes in location based systems. The company has developed products which enables the near real time management and secure data reporting of a large work force working in distributed locations. The system has been created utilizing a sophisticated data transfer security mechanism and is therefore best suited best for the healthcare and homeland security verticals. The system uses concepts adapted from Israeli military Command & Control systems. Lomiss founders come from a broad background of business development, project management and multi million dol- lar projects in the media, telecommunication and security sectors contact@lomiss.com www.lomiss.com