SlideShare una empresa de Scribd logo
1 de 28
REMOVE THIS: I have edited only certain things, not sure
                   about changing other text (like company name) since this was
                   something from a conference in 2006

Evolutionary Detection and Prevention of Improvised Explosive Devices and
                        Related Terrorist Weapons




                                       SMi CBRN      20 September, 2006


                                           Martin Joseph Dudziak PhD


                                             TETRAD Technologies Group, Inc.
                                                       Richmond, VA (USA)
Three Absolutes for Adequate Protection
                                                 Against Today’s and Tomorrow’s Terrorists
          •     Ability to Think and Act Ahead, not merely reactively, postfacto
                                                                                  Martin, 7.jan.10:
                                                                                   Martin, 7.jan.10:
                  Conventional TNT
                                                                                  for instance, one
                                                                                   for instance, one
                                           Compact C4, Cemtex                     can add not only
                                                                                   can add not only
                                                                                  body-wrap but body-
                                                                                   body-wrap but body-
                                                                                  cavity-insert
                                                           HMTD, TATP              cavity-insert
                                                                                  weaponry - -the drug
                                                                                   weaponry the drug
                                                                                  carriers perfected
                                                                      ????         carriers perfected
                                                                                  that art long ago
                                                                                   that art long ago


          •     High-sensitivity for multiple substances in diverse environments
                 • Not limited to one type of chemical agents
                 • Not restricted to particular operating environments and
                   architectures (functional and literal chokepoints and get-arounds)

          •     Usability – the non-technical-specialist needs to be able to use this
                effectively without a great deal of concentration or specialized learning
                (If it is so specialized and sensitive, it will have predictable operational
                fail-points)

Copyright 2006 TETRAD Technologies Group, Inc.
High-Demand Challenges

     •     Weapon Technology
           – Chemistry
           – Architecture
           – Concealment

     •     Weapon Effectiveness
           – Fault-tolerance and Fail-safe Mechanisms
           – Necessary vs. Sufficient Yield
           – Ability to mimic false positives and build “immunity” to detection

     •     Detection Strategy
            – Must evolve from “detect at point of deployment” to “detect at
              place of design and manufacture”
            – Must “look ahead” to new weapon design engineering, operations

Copyright 2006 TETRAD Technologies Group, Inc.
Lessons from Manila, London et al
                                                                         Martin, 7.jan.10:
                                                                          Martin, 7.jan.10:
     • Finding                                                           This paper and
                                                                          This paper and
                                                                         presentation was
             –    “Mega-bureaucracy” practices are reinforcing an “ossification”was
                                                                          presentation
                                                                         originally 2005, then
                                                                          originally 2005, then
                  process that inhibits innovation and variation.        reshaped for 2006,
                                                                          reshaped for 2006,
             –                                                           and all the big
                  “Plans and plots disrupted in the nick of time” - not a and all the big
                                                                           strong
                                                                         agencies and
                  defence but an invitation to keep trying.               agencies and
                                                                         bureaucracies have
                                                                          bureaucracies have
             –    “Thinking outside the box” is the enemy’s strength but is exactly the
                                                                          done a
                                                                         done exactly the
                                                                         wrong things, even
                  technique discouraged in various “noveau securité” the opposite of even
                                                                         circles.
                                                                          wrong things,
                                                                          the opposite ofthis
                                                                                           this
     • Recommendation                                                    sound strategy.
                                                                          sound strategy.
             – Need for more versatile programs and contracting vehicles.
                     • Applying “innocent until proven guilty” attitude into “plausible until
                       demonstrated otherwise”
                     • Mobility and transformability
                     • Unpredictability from the perspective of the enemy
             – Need for “gateway intelligence systems” comparable to gateway
               communications (e.g. Raytheon ACU-1000) that allow for
               interoperability.
             – Need for more than “Yada yada” – Yet Another Device Again
Copyright 2006 TETRAD Technologies Group, Inc.
Solutions


          • One reconfigurable, easy, cheap, adaptable Martin, 7.jan.10:
                                                               Martin, 7.jan.10:
            technology (applying what EE & IT learned long ago)Likeeven Obamaall
                                                              Like even Obama
                                                              admits now, and
                                                                    admits now, and all
                                                                  the smart Old-Guard
                                                                    the smart Old-Guard
                                                                  (retired) NSC and
                                                                    (retired) NSC and
          • Non-intrusive for mass transit, esp. air travel       CIA guys are saying,
                                                                    CIA guys are saying,
                                                                  WE HAVE NO
                                                                    WE HAVE NO
                                                                  SYEM, NO
                                                                    SYEM, NO
                                                                  INTEGRATION, just
                                                                    INTEGRATION, just
                                                                  aalot of data
          • Harder (for terrorists) to predict or get-around by        lot of data
                                                                  collection. This is
                                                                    collection. This is
            coming up with a modified chemistry or biology        like being able to
                                                                    like being able to
                                                                  cut, split and stack
                                                                    cut, split and stack
                                                                  firewood, but have
                                                                    firewood, but have
                                                                  no stove in which to
                                                                    no stove in which to
          • Integrable with Existing Detection and Inspection     burn it. what
                                                                    burn it. what
                                                                  happens? You
                                                                    happens? You
            Systems                                               freeze to death.
                                                                    freeze to death.




Copyright 2006 TETRAD Technologies Group, Inc.
Martin, 7.jan.10:
                                                                                       Martin, 7.jan.10:
                                                                                      This is not imaginary
                                                                                       This is not imaginary
                                                                                      but real and ready
                 JEDI                  (aka “CEBIT”)
                                                                                       but real and ready
                                                                                      for mfgr. and use - -
                                                                                       for mfgr. and use
                                                                                      the images at left
                                                                                       the images at left
                          Chemical Explosive Biothreat                 Identification are from working
                                                                                       and Tracking
                                                                                       are from working
                                                                                      prototypes, from
                                                                                       prototypes, from
                                                                                      2005 and earlier!!!
                                                                                       2005 and earlier!!!




                                                                                                                     AF123 – LAX –
                                                                   DCL          PWR
                                                       MEM




                                                                                                    1234567-BROWNJ
                                                                  MSL
                                                       PROC
                                                              (e.g., 4x4 cell         Battery
                                                                   array)

                                                                     ACT




Copyright 2006 TETRAD Technologies Group, Inc.
Chemical Explosive Biothreat Identification and Tracking


      JEDI / CEBIT
      A solution that (economically, and ergonomically) CAN “cover all bases”

      Components:
      1. An extensible grid (array) of multi-spectral, multi-functional sensor elements – Not Only
      For Explosives (but that is the Present Focus and Demand).

      2. A chip set operating in a card package – self-contained, self-powered, easy, robust,
      and very inexpensive.

      3. A human factors system that is unobtrusive and can increase protection while
      speeding up the inspection process.

      4. Adaptable “engine” to meet future needs (especially “E” and “B” threats) As They
      Emerge.

      5. Aerosol concentrator auxiliary system to handle cases of extremely difficult
      concentrations due to the nature of the compound or the operating environment.

      6. A scalable architecture that can be operated as a network in a number of confined
      physical environments or expanded to roadside/neighborhood outdoor operations.


Copyright 2006 TETRAD Technologies Group, Inc.
JEDI / CEBIT


                                                         CHECK-IN


                                                                                        Activation

                                                      Checked
                                                       Checked          Carry-On
                                                        Checked
      Martin, 7.jan.10:
       Martin, 7.jan.10:
      We were told by
       We were told by
      bureaucrats in DHS,
       bureaucrats in DHS,                                                                    Working
      JIEDDO and TSWG                                                  Security (Std)
       JIEDDO and TSWG                           Security (Std)
      in 2005, 2006, 2007
       in 2005, 2006, 2007
      that all this was not
       that all this was not
      necessary because
       necessary because
      the problem was
       the problem was
      solved and under
       solved and under
      control - -I Ikid you
       control kid you
      not!
       not!                                                               GATE             Validation
                      Validation                 PRE-LOAD



Copyright 2006 TETRAD Technologies Group, Inc.
Chemical Explosive Biothreat Identification and Tracking


        JEDI / CEBIT
        Analysis based upon predictive, modeling-building order/lattice theory, inverse
        methods, support vector algorithms, and related nonlinear reasoning models

        ♦ Reliance upon sensors, Bayesian PR, post-symptomatic reports alone is insufficient

        ♦ Greatest risk of missing the threat underway is in slow ability to rapidly plan and
        coordinate response on multiple levels – similar as with biothreats – sensing agents,
        decon, sampling, diagnosis, treatments

        ♦ Information Integration must occur at the micro (chip) level

        ♦ JEDI (CEBIT) learns from what worked and failed in similar system environments

        ♦ Confirmation and refinement of identified threats, false positives requires improved
        methods – SVM and IRM (GENET) can provide better discrimination & classification

        ♦ Coordination of resources, teams, delivery, dissemination, disbursement requires
        the approach used in CHAIN and COPF



Copyright 2006 TETRAD Technologies Group, Inc.
JEDI / CEBIT




                                                                                  Deformable Registration




                                                 Diffusion-Attraction




            Mutual Information




Copyright 2006 TETRAD Technologies Group, Inc.
JEDI / CEBIT




                                                                Hierarchically ordered
                                                                networks of relations
                                                                (events)




Copyright 2006 TETRAD Technologies Group, Inc.
JEDI / CEBIT



      NOT ONLY for Operation at TARGETS but at SOURCES




Copyright 2006 TETRAD Technologies Group, Inc.
Chemical Explosive Biothreat Identification and Tracking


          JEDI CONOPS Model – built upon biological foundations




Copyright 2006 TETRAD Technologies Group, Inc.
Chemical Explosive Biothreat Identification and Tracking

          Incident (Site) Prediction Example




         Detections during span t1,2                                    Reported Indicators overlapping t1,2




         IRM Predicted Convergence post-t2                                Predicted Incidents post-t2
Copyright 2006 TETRAD Technologies Group, Inc.
Chemical Explosive Biothreat Identification and Tracking

     The GIS components are essential for critical data and interactive human+machine analysis.
     The missing ingredients are available and readily integrated with the mathematical analytics.
     With architectures such as Nomad Eyes or Red Cell, the communication gaps can be
     crossed for data gathering, verification, planning and response.




Copyright 2006 TETRAD Technologies Group, Inc.
NEXT STEPS Needed Now, Not After Another 9-11



      JEDI / CEBIT
      IS READY FOR FIELD TESTING AND PROTOTYPING

      Actions Required:
      One Agency that wants to take the lead in protecting their people, their country.

      One specific flexible, receptive test environment (real airport, real neighborhood).

      One firm step forward to enable co-creating the fieldable, working operational system.

      One “break” from the monotony of the usual prolonged set of procedures and delays that
      often are indirectly serving the aims of terrorists.

      A few open doors.

      A modest budget.

      A unified team with the determination to stop those who want to destroy our lives.



Copyright 2006 TETRAD Technologies Group, Inc.
Contacts

                                  TETRADYN (TETRAD Dynamics)
Martin Dudziak (Exec Chmn)        28 Chase Gayton Circle, Suite 731
   – (757) 847-5511               Richmond, VA 23238 USA
   – (804) 740-0342
   – (202) 415-7295
   – martinjd@tetradyn.com
– also see http://tetradyn.com/contact.php for more of the business team
Coordinated Biothreat Protection and Response System



                                                            Backup Material




                                       CUBIT / CBPR as System, Program




Copyright © 2006 Martin J. Dudziak, PhD and The S4 Center, Inc.
Nitrate

Peroxide
Organophosphate

Carbamate

Sulfate

MRSA
                  Sense Targets
VRE

H5N1
TB

Protein marker1
Protein marker2

U-Decide-It
Sensing Methods


MC (Micro-cantilever)

ROB (Resonant Optical)
PLC (Polymer Laminate Catalyst)
CUBIT CONOPS Vision
              Unified Communications from Every Perspective




Real-Time Situational Awareness: Decision-
makers can get the helicopters and HMMWVs
to the victims fast!




Get the Right Information to the Right
People for the Purpose of Saving Lives.      Translating Data Visualization & Analysis
                                             into concrete “go here, don’t go there”
                                             messages
Coordinated Unified Biothreat Intervention and Tracking
    •        Verona™ is a field-tested intelligent
             knowledge management and
             discovery notebook [1]
    •        Command-Post-of-the-Future is now
             in-the-present serving US forces [1]
    •        CMDRS [1] and other agent-based
             situation awareness and knowledge
             discovery components are readily
             adaptable to Clinical Medicine,
             Epidemiology, Disease Management
             and Public Health applications




Copyright 2006 TETRAD Technologies Group, Inc.
Coordinated Unified Biothreat Intervention and Tracking
                            CHAIN Overview                                    Chain
                                                                               API                            Web
                         Monitor
                         Monitor                                                                  V
                           Monitor
                            Monitor                                                                          Clients
                         Agents
                              Monitor
                          Agents                                                                  I
                           Agents
                            Agents
                              Agents                                                              E
 Analysis
  Analysis                                                                                        W           Fat
   Analysis                                                                                                  Clients
 Agents
  Agents
    Agents                       Intelligent Services                                             C
                                    Layer (ISL)                                                   N          CMD
                                                                                                  T          Line
 Notification                                                                                     L
  Agents
                                        Chain
                                         Chain
                                          Chain
                                        Agents
                                         Agents
Utilizes ISL for Agent                    Agents             Intelligent Workflow              Multiple Comm Protocols
                                                             Management                              - SOAP/HTTP
Coordination
                                                                                                     - RMI/IIOP
                                         CHAIN               Implement Plans which Operate
                                                             on Events & Operator Direction
                                         Engine
                                                             Communicate Knowledge Across
 Monitor, Analysis, Notification                             Activities
 - Query Databases, Repositories, Web Pages,
   & Sensors                                                 Execute External Processes
 - Monitor Critical Events Across the Globe                  Based on Results
 - Intelligently Notify Users of Critical Events
Copyright 2006 TETRAD Technologies Group, Inc.
ISL Architecture
                                   CMDRS                                                   Weather Data
    Fire/Rescue
                                   Desktop



  Law Enforcement
                                                Intelligent Services
                                    D-COP          Layer (ISL)                   Data
                                                                                  Data
                              Master Schedule                                    Wrappe
                                                                                  Wrappe
                                                                                 rr
                              Unit Locations

                                                                     Data
                                                                      Data
                                                                     Wrapper
                                                                      Wrapper
                                                    Data
                                                     Data
                                                    Wrapper
                                                     Wrapper
   Health Services
                                                                                             Traffic Data




                                                                                           Geological
National Guard                                                                             Data
                     Coast Guard                               Public Services
LumINT: Knowledge Discovery
 Intelligent Agents              Analyst Portal             Federated Search
                                                                                                         GIS
                                                             Search
                                      Le Monde




                                      Al Jazeera
                                                                                 >>
                                                                                 and
                                                             Person…             or
                                                             Organization
                                      Ettelaat
                                                             Location            not
                                                             Keyword                   Search   Clear   Reset   Save as Search Agent
        Search Agents




Knowledge Organizer                                                                    Concept Analysis
                                        Agent and Service based
                                        Integration Framework
                                         Best of Breeds COTS

                        Translation                Visualization            Link Analysis
LumINT Information Flow
                                     Verity Chiliad
                        CHAIN                 Search
                                    Federated
                        Agents       Search         Document
                                                    Collection
                                                     Indexes
                                     Yahoo
           LumINT                    News
            J2EE        KStore      Mediator
           WebApps

Verona                               Google
Notebook                             Search
                          Tool
                                    Mediator               QuickTime™ and a


                        Discovery                TIFF (Uncompressed) decompressor
                                                    are needed to see this picture.




                         Service
           Workflow
           Controller               Concept
            Agent                   Analysis
                                    Engine
                                               Concept
                                               Database
*** Advanced
                             Visualizations

      *** CASE Applications GUI                CASE Evaluation Tools
        Common Look and Feel                    Quantitative Analysis

Portal - Distributed Collaborative Content Sharing    Workflow Manager

        *** CASE Web Services                        Analyst Activity
        and Agents Components                           Logger

   Core Services and Agents              ** Knowledge Representation
Common Infrastructure Components       Mediator (e.g. OWL, KIF, CL, OKBC)

   Information Sharing Policy Manager - Per-agency or per-analyst

     Security Guard - (e.g. ISSE Guard, Radiant Mercury, InfoPump)

 Grid Enabled Integration Framework - Plug-and Play of ALL components

Documents     Message Streams
                                      Knowledge            Logger
  RDBMS             WWW               Repositories        Repository

Más contenido relacionado

Destacado

Proyecto SISMENE.
Proyecto SISMENE.Proyecto SISMENE.
Proyecto SISMENE.Sergio
 
Winger na SAP Club
Winger na SAP ClubWinger na SAP Club
Winger na SAP ClubRui Valente
 
Kurt Rekash Stalin
Kurt Rekash StalinKurt Rekash Stalin
Kurt Rekash Stalintnaumann
 
Mono y oligopolio (2)
Mono y oligopolio (2)Mono y oligopolio (2)
Mono y oligopolio (2)Vilmi22
 
Vuelta a España 2009.
Vuelta a España 2009.Vuelta a España 2009.
Vuelta a España 2009.NEWfly
 
Outlet pr2pt1 word
Outlet pr2pt1 wordOutlet pr2pt1 word
Outlet pr2pt1 wordmtnrider001
 
Outdoor Learning and ICT
Outdoor Learning and ICTOutdoor Learning and ICT
Outdoor Learning and ICTMart Laanpere
 
Kurtis R7 Hdd
Kurtis R7 HddKurtis R7 Hdd
Kurtis R7 Hddalfschool
 
Donald Nicholson - teaching ethics clinically without breaking the bank
Donald Nicholson - teaching ethics clinically without breaking the bankDonald Nicholson - teaching ethics clinically without breaking the bank
Donald Nicholson - teaching ethics clinically without breaking the bankHEA Law
 

Destacado (11)

Proyecto SISMENE.
Proyecto SISMENE.Proyecto SISMENE.
Proyecto SISMENE.
 
Winger na SAP Club
Winger na SAP ClubWinger na SAP Club
Winger na SAP Club
 
Kurt Rekash Stalin
Kurt Rekash StalinKurt Rekash Stalin
Kurt Rekash Stalin
 
Mono y oligopolio (2)
Mono y oligopolio (2)Mono y oligopolio (2)
Mono y oligopolio (2)
 
Jun114a
Jun114aJun114a
Jun114a
 
Vuelta a España 2009.
Vuelta a España 2009.Vuelta a España 2009.
Vuelta a España 2009.
 
Outlet pr2pt1 word
Outlet pr2pt1 wordOutlet pr2pt1 word
Outlet pr2pt1 word
 
Outdoor Learning and ICT
Outdoor Learning and ICTOutdoor Learning and ICT
Outdoor Learning and ICT
 
Kurtis R7 Hdd
Kurtis R7 HddKurtis R7 Hdd
Kurtis R7 Hdd
 
Donald Nicholson - teaching ethics clinically without breaking the bank
Donald Nicholson - teaching ethics clinically without breaking the bankDonald Nicholson - teaching ethics clinically without breaking the bank
Donald Nicholson - teaching ethics clinically without breaking the bank
 
NPS Channel Islands
NPS Channel IslandsNPS Channel Islands
NPS Channel Islands
 

Más de martindudziak

Annot Mjd Selected Present Course Train Aug07
Annot Mjd Selected Present Course Train Aug07Annot Mjd Selected Present Course Train Aug07
Annot Mjd Selected Present Course Train Aug07martindudziak
 
Coordinated And Unified Responses To Unpredictable And Widespread Biothreats
Coordinated And Unified Responses To Unpredictable And Widespread BiothreatsCoordinated And Unified Responses To Unpredictable And Widespread Biothreats
Coordinated And Unified Responses To Unpredictable And Widespread Biothreatsmartindudziak
 
New Iaa Magopt Paper
New Iaa Magopt PaperNew Iaa Magopt Paper
New Iaa Magopt Papermartindudziak
 
Redbionet Idhs White Paper
Redbionet Idhs White PaperRedbionet Idhs White Paper
Redbionet Idhs White Papermartindudziak
 
Radterrorism Spb Oct04
Radterrorism Spb Oct04Radterrorism Spb Oct04
Radterrorism Spb Oct04martindudziak
 
Radterror Spb Oct04 Paper
Radterror Spb Oct04 PaperRadterror Spb Oct04 Paper
Radterror Spb Oct04 Papermartindudziak
 
Empires Idhs Red Cell White Paper
Empires Idhs Red Cell White PaperEmpires Idhs Red Cell White Paper
Empires Idhs Red Cell White Papermartindudziak
 
Berlin Intl Sec Conf2 Paper
Berlin Intl Sec Conf2 PaperBerlin Intl Sec Conf2 Paper
Berlin Intl Sec Conf2 Papermartindudziak
 
Hsis2005 Geospatial Nomadeyes Full
Hsis2005 Geospatial Nomadeyes FullHsis2005 Geospatial Nomadeyes Full
Hsis2005 Geospatial Nomadeyes Fullmartindudziak
 

Más de martindudziak (20)

Annot Mjd Selected Present Course Train Aug07
Annot Mjd Selected Present Course Train Aug07Annot Mjd Selected Present Course Train Aug07
Annot Mjd Selected Present Course Train Aug07
 
Coordinated And Unified Responses To Unpredictable And Widespread Biothreats
Coordinated And Unified Responses To Unpredictable And Widespread BiothreatsCoordinated And Unified Responses To Unpredictable And Widespread Biothreats
Coordinated And Unified Responses To Unpredictable And Widespread Biothreats
 
Structinteg
StructintegStructinteg
Structinteg
 
Ndemetalassemb
NdemetalassembNdemetalassemb
Ndemetalassemb
 
Nanosp98paper
Nanosp98paperNanosp98paper
Nanosp98paper
 
New Iaa Magopt Paper
New Iaa Magopt PaperNew Iaa Magopt Paper
New Iaa Magopt Paper
 
Spmnanopres
SpmnanopresSpmnanopres
Spmnanopres
 
Landmines
LandminesLandmines
Landmines
 
Ihee Ppres0998
Ihee Ppres0998Ihee Ppres0998
Ihee Ppres0998
 
Redbionet Idhs White Paper
Redbionet Idhs White PaperRedbionet Idhs White Paper
Redbionet Idhs White Paper
 
Radterrorism Spb Oct04
Radterrorism Spb Oct04Radterrorism Spb Oct04
Radterrorism Spb Oct04
 
Radterror Spb Oct04 Paper
Radterror Spb Oct04 PaperRadterror Spb Oct04 Paper
Radterror Spb Oct04 Paper
 
Empires Idhs Red Cell White Paper
Empires Idhs Red Cell White PaperEmpires Idhs Red Cell White Paper
Empires Idhs Red Cell White Paper
 
Berlin Intl Sec Conf2 Paper
Berlin Intl Sec Conf2 PaperBerlin Intl Sec Conf2 Paper
Berlin Intl Sec Conf2 Paper
 
Ecosymbiotics01
Ecosymbiotics01Ecosymbiotics01
Ecosymbiotics01
 
Qnsrbio
QnsrbioQnsrbio
Qnsrbio
 
Tdbasicsem
TdbasicsemTdbasicsem
Tdbasicsem
 
Bistablecamnets
BistablecamnetsBistablecamnets
Bistablecamnets
 
Sciconsc
SciconscSciconsc
Sciconsc
 
Hsis2005 Geospatial Nomadeyes Full
Hsis2005 Geospatial Nomadeyes FullHsis2005 Geospatial Nomadeyes Full
Hsis2005 Geospatial Nomadeyes Full
 

Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010

  • 1. REMOVE THIS: I have edited only certain things, not sure about changing other text (like company name) since this was something from a conference in 2006 Evolutionary Detection and Prevention of Improvised Explosive Devices and Related Terrorist Weapons SMi CBRN 20 September, 2006 Martin Joseph Dudziak PhD TETRAD Technologies Group, Inc. Richmond, VA (USA)
  • 2. Three Absolutes for Adequate Protection Against Today’s and Tomorrow’s Terrorists • Ability to Think and Act Ahead, not merely reactively, postfacto Martin, 7.jan.10: Martin, 7.jan.10: Conventional TNT for instance, one for instance, one Compact C4, Cemtex can add not only can add not only body-wrap but body- body-wrap but body- cavity-insert HMTD, TATP cavity-insert weaponry - -the drug weaponry the drug carriers perfected ???? carriers perfected that art long ago that art long ago • High-sensitivity for multiple substances in diverse environments • Not limited to one type of chemical agents • Not restricted to particular operating environments and architectures (functional and literal chokepoints and get-arounds) • Usability – the non-technical-specialist needs to be able to use this effectively without a great deal of concentration or specialized learning (If it is so specialized and sensitive, it will have predictable operational fail-points) Copyright 2006 TETRAD Technologies Group, Inc.
  • 3. High-Demand Challenges • Weapon Technology – Chemistry – Architecture – Concealment • Weapon Effectiveness – Fault-tolerance and Fail-safe Mechanisms – Necessary vs. Sufficient Yield – Ability to mimic false positives and build “immunity” to detection • Detection Strategy – Must evolve from “detect at point of deployment” to “detect at place of design and manufacture” – Must “look ahead” to new weapon design engineering, operations Copyright 2006 TETRAD Technologies Group, Inc.
  • 4. Lessons from Manila, London et al Martin, 7.jan.10: Martin, 7.jan.10: • Finding This paper and This paper and presentation was – “Mega-bureaucracy” practices are reinforcing an “ossification”was presentation originally 2005, then originally 2005, then process that inhibits innovation and variation. reshaped for 2006, reshaped for 2006, – and all the big “Plans and plots disrupted in the nick of time” - not a and all the big strong agencies and defence but an invitation to keep trying. agencies and bureaucracies have bureaucracies have – “Thinking outside the box” is the enemy’s strength but is exactly the done a done exactly the wrong things, even technique discouraged in various “noveau securité” the opposite of even circles. wrong things, the opposite ofthis this • Recommendation sound strategy. sound strategy. – Need for more versatile programs and contracting vehicles. • Applying “innocent until proven guilty” attitude into “plausible until demonstrated otherwise” • Mobility and transformability • Unpredictability from the perspective of the enemy – Need for “gateway intelligence systems” comparable to gateway communications (e.g. Raytheon ACU-1000) that allow for interoperability. – Need for more than “Yada yada” – Yet Another Device Again Copyright 2006 TETRAD Technologies Group, Inc.
  • 5. Solutions • One reconfigurable, easy, cheap, adaptable Martin, 7.jan.10: Martin, 7.jan.10: technology (applying what EE & IT learned long ago)Likeeven Obamaall Like even Obama admits now, and admits now, and all the smart Old-Guard the smart Old-Guard (retired) NSC and (retired) NSC and • Non-intrusive for mass transit, esp. air travel CIA guys are saying, CIA guys are saying, WE HAVE NO WE HAVE NO SYEM, NO SYEM, NO INTEGRATION, just INTEGRATION, just aalot of data • Harder (for terrorists) to predict or get-around by lot of data collection. This is collection. This is coming up with a modified chemistry or biology like being able to like being able to cut, split and stack cut, split and stack firewood, but have firewood, but have no stove in which to no stove in which to • Integrable with Existing Detection and Inspection burn it. what burn it. what happens? You happens? You Systems freeze to death. freeze to death. Copyright 2006 TETRAD Technologies Group, Inc.
  • 6. Martin, 7.jan.10: Martin, 7.jan.10: This is not imaginary This is not imaginary but real and ready JEDI (aka “CEBIT”) but real and ready for mfgr. and use - - for mfgr. and use the images at left the images at left Chemical Explosive Biothreat Identification are from working and Tracking are from working prototypes, from prototypes, from 2005 and earlier!!! 2005 and earlier!!! AF123 – LAX – DCL PWR MEM 1234567-BROWNJ MSL PROC (e.g., 4x4 cell Battery array) ACT Copyright 2006 TETRAD Technologies Group, Inc.
  • 7. Chemical Explosive Biothreat Identification and Tracking JEDI / CEBIT A solution that (economically, and ergonomically) CAN “cover all bases” Components: 1. An extensible grid (array) of multi-spectral, multi-functional sensor elements – Not Only For Explosives (but that is the Present Focus and Demand). 2. A chip set operating in a card package – self-contained, self-powered, easy, robust, and very inexpensive. 3. A human factors system that is unobtrusive and can increase protection while speeding up the inspection process. 4. Adaptable “engine” to meet future needs (especially “E” and “B” threats) As They Emerge. 5. Aerosol concentrator auxiliary system to handle cases of extremely difficult concentrations due to the nature of the compound or the operating environment. 6. A scalable architecture that can be operated as a network in a number of confined physical environments or expanded to roadside/neighborhood outdoor operations. Copyright 2006 TETRAD Technologies Group, Inc.
  • 8. JEDI / CEBIT CHECK-IN Activation Checked Checked Carry-On Checked Martin, 7.jan.10: Martin, 7.jan.10: We were told by We were told by bureaucrats in DHS, bureaucrats in DHS, Working JIEDDO and TSWG Security (Std) JIEDDO and TSWG Security (Std) in 2005, 2006, 2007 in 2005, 2006, 2007 that all this was not that all this was not necessary because necessary because the problem was the problem was solved and under solved and under control - -I Ikid you control kid you not! not! GATE Validation Validation PRE-LOAD Copyright 2006 TETRAD Technologies Group, Inc.
  • 9. Chemical Explosive Biothreat Identification and Tracking JEDI / CEBIT Analysis based upon predictive, modeling-building order/lattice theory, inverse methods, support vector algorithms, and related nonlinear reasoning models ♦ Reliance upon sensors, Bayesian PR, post-symptomatic reports alone is insufficient ♦ Greatest risk of missing the threat underway is in slow ability to rapidly plan and coordinate response on multiple levels – similar as with biothreats – sensing agents, decon, sampling, diagnosis, treatments ♦ Information Integration must occur at the micro (chip) level ♦ JEDI (CEBIT) learns from what worked and failed in similar system environments ♦ Confirmation and refinement of identified threats, false positives requires improved methods – SVM and IRM (GENET) can provide better discrimination & classification ♦ Coordination of resources, teams, delivery, dissemination, disbursement requires the approach used in CHAIN and COPF Copyright 2006 TETRAD Technologies Group, Inc.
  • 10. JEDI / CEBIT Deformable Registration Diffusion-Attraction Mutual Information Copyright 2006 TETRAD Technologies Group, Inc.
  • 11. JEDI / CEBIT Hierarchically ordered networks of relations (events) Copyright 2006 TETRAD Technologies Group, Inc.
  • 12. JEDI / CEBIT NOT ONLY for Operation at TARGETS but at SOURCES Copyright 2006 TETRAD Technologies Group, Inc.
  • 13. Chemical Explosive Biothreat Identification and Tracking JEDI CONOPS Model – built upon biological foundations Copyright 2006 TETRAD Technologies Group, Inc.
  • 14. Chemical Explosive Biothreat Identification and Tracking Incident (Site) Prediction Example Detections during span t1,2 Reported Indicators overlapping t1,2 IRM Predicted Convergence post-t2 Predicted Incidents post-t2 Copyright 2006 TETRAD Technologies Group, Inc.
  • 15. Chemical Explosive Biothreat Identification and Tracking The GIS components are essential for critical data and interactive human+machine analysis. The missing ingredients are available and readily integrated with the mathematical analytics. With architectures such as Nomad Eyes or Red Cell, the communication gaps can be crossed for data gathering, verification, planning and response. Copyright 2006 TETRAD Technologies Group, Inc.
  • 16. NEXT STEPS Needed Now, Not After Another 9-11 JEDI / CEBIT IS READY FOR FIELD TESTING AND PROTOTYPING Actions Required: One Agency that wants to take the lead in protecting their people, their country. One specific flexible, receptive test environment (real airport, real neighborhood). One firm step forward to enable co-creating the fieldable, working operational system. One “break” from the monotony of the usual prolonged set of procedures and delays that often are indirectly serving the aims of terrorists. A few open doors. A modest budget. A unified team with the determination to stop those who want to destroy our lives. Copyright 2006 TETRAD Technologies Group, Inc.
  • 17. Contacts TETRADYN (TETRAD Dynamics) Martin Dudziak (Exec Chmn) 28 Chase Gayton Circle, Suite 731 – (757) 847-5511 Richmond, VA 23238 USA – (804) 740-0342 – (202) 415-7295 – martinjd@tetradyn.com – also see http://tetradyn.com/contact.php for more of the business team
  • 18. Coordinated Biothreat Protection and Response System Backup Material CUBIT / CBPR as System, Program Copyright © 2006 Martin J. Dudziak, PhD and The S4 Center, Inc.
  • 19. Nitrate Peroxide Organophosphate Carbamate Sulfate MRSA Sense Targets VRE H5N1 TB Protein marker1 Protein marker2 U-Decide-It
  • 20. Sensing Methods MC (Micro-cantilever) ROB (Resonant Optical) PLC (Polymer Laminate Catalyst)
  • 21. CUBIT CONOPS Vision Unified Communications from Every Perspective Real-Time Situational Awareness: Decision- makers can get the helicopters and HMMWVs to the victims fast! Get the Right Information to the Right People for the Purpose of Saving Lives. Translating Data Visualization & Analysis into concrete “go here, don’t go there” messages
  • 22. Coordinated Unified Biothreat Intervention and Tracking • Verona™ is a field-tested intelligent knowledge management and discovery notebook [1] • Command-Post-of-the-Future is now in-the-present serving US forces [1] • CMDRS [1] and other agent-based situation awareness and knowledge discovery components are readily adaptable to Clinical Medicine, Epidemiology, Disease Management and Public Health applications Copyright 2006 TETRAD Technologies Group, Inc.
  • 23. Coordinated Unified Biothreat Intervention and Tracking CHAIN Overview Chain API Web Monitor Monitor V Monitor Monitor Clients Agents Monitor Agents I Agents Agents Agents E Analysis Analysis W Fat Analysis Clients Agents Agents Agents Intelligent Services C Layer (ISL) N CMD T Line Notification L Agents Chain Chain Chain Agents Agents Utilizes ISL for Agent Agents Intelligent Workflow Multiple Comm Protocols Management - SOAP/HTTP Coordination - RMI/IIOP CHAIN Implement Plans which Operate on Events & Operator Direction Engine Communicate Knowledge Across Monitor, Analysis, Notification Activities - Query Databases, Repositories, Web Pages, & Sensors Execute External Processes - Monitor Critical Events Across the Globe Based on Results - Intelligently Notify Users of Critical Events Copyright 2006 TETRAD Technologies Group, Inc.
  • 24. ISL Architecture CMDRS Weather Data Fire/Rescue Desktop Law Enforcement Intelligent Services D-COP Layer (ISL) Data Data Master Schedule Wrappe Wrappe rr Unit Locations Data Data Wrapper Wrapper Data Data Wrapper Wrapper Health Services Traffic Data Geological National Guard Data Coast Guard Public Services
  • 25. LumINT: Knowledge Discovery Intelligent Agents Analyst Portal Federated Search GIS Search Le Monde Al Jazeera >> and Person… or Organization Ettelaat Location not Keyword Search Clear Reset Save as Search Agent Search Agents Knowledge Organizer Concept Analysis Agent and Service based Integration Framework Best of Breeds COTS Translation Visualization Link Analysis
  • 26. LumINT Information Flow Verity Chiliad CHAIN Search Federated Agents Search Document Collection Indexes Yahoo LumINT News J2EE KStore Mediator WebApps Verona Google Notebook Search Tool Mediator QuickTime™ and a Discovery TIFF (Uncompressed) decompressor are needed to see this picture. Service Workflow Controller Concept Agent Analysis Engine Concept Database
  • 27.
  • 28. *** Advanced Visualizations *** CASE Applications GUI CASE Evaluation Tools Common Look and Feel Quantitative Analysis Portal - Distributed Collaborative Content Sharing Workflow Manager *** CASE Web Services Analyst Activity and Agents Components Logger Core Services and Agents ** Knowledge Representation Common Infrastructure Components Mediator (e.g. OWL, KIF, CL, OKBC) Information Sharing Policy Manager - Per-agency or per-analyst Security Guard - (e.g. ISSE Guard, Radiant Mercury, InfoPump) Grid Enabled Integration Framework - Plug-and Play of ALL components Documents Message Streams Knowledge Logger RDBMS WWW Repositories Repository

Notas del editor

  1. In the future, a victim of a crisis should be able to press a few buttons on a mobile phone, and instantly, an icon appears somewhere on an incident commanders map, telling him the victim ’ s location, status, and any pictures or audio reports. When we bring integrated micro-sensors into the field of vision, the incident commander can even get a read on the presence of any biological or chemical contaminants. I don ’ t know if you can make out this picture, but this is a photo sent by a London Underground bombing victim trying to get out of a subway station shortly after the 7/7 attacks. I remember watching this live on Fox News when it was happening. It really burned me up when I saw this, because it ’ s just another example of the private sector out-pacing the government in the exploitation of emerging technology. Why didn ’ t we have this during Katrina? How many people didn ’ t have to drown to death if their own homes if they could have gotten the right information to the people controlling the helicopters and the HMMWVs?