Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010
1. REMOVE THIS: I have edited only certain things, not sure
about changing other text (like company name) since this was
something from a conference in 2006
Evolutionary Detection and Prevention of Improvised Explosive Devices and
Related Terrorist Weapons
SMi CBRN 20 September, 2006
Martin Joseph Dudziak PhD
TETRAD Technologies Group, Inc.
Richmond, VA (USA)
2. Three Absolutes for Adequate Protection
Against Today’s and Tomorrow’s Terrorists
• Ability to Think and Act Ahead, not merely reactively, postfacto
Martin, 7.jan.10:
Martin, 7.jan.10:
Conventional TNT
for instance, one
for instance, one
Compact C4, Cemtex can add not only
can add not only
body-wrap but body-
body-wrap but body-
cavity-insert
HMTD, TATP cavity-insert
weaponry - -the drug
weaponry the drug
carriers perfected
???? carriers perfected
that art long ago
that art long ago
• High-sensitivity for multiple substances in diverse environments
• Not limited to one type of chemical agents
• Not restricted to particular operating environments and
architectures (functional and literal chokepoints and get-arounds)
• Usability – the non-technical-specialist needs to be able to use this
effectively without a great deal of concentration or specialized learning
(If it is so specialized and sensitive, it will have predictable operational
fail-points)
Copyright 2006 TETRAD Technologies Group, Inc.
3. High-Demand Challenges
• Weapon Technology
– Chemistry
– Architecture
– Concealment
• Weapon Effectiveness
– Fault-tolerance and Fail-safe Mechanisms
– Necessary vs. Sufficient Yield
– Ability to mimic false positives and build “immunity” to detection
• Detection Strategy
– Must evolve from “detect at point of deployment” to “detect at
place of design and manufacture”
– Must “look ahead” to new weapon design engineering, operations
Copyright 2006 TETRAD Technologies Group, Inc.
4. Lessons from Manila, London et al
Martin, 7.jan.10:
Martin, 7.jan.10:
• Finding This paper and
This paper and
presentation was
– “Mega-bureaucracy” practices are reinforcing an “ossification”was
presentation
originally 2005, then
originally 2005, then
process that inhibits innovation and variation. reshaped for 2006,
reshaped for 2006,
– and all the big
“Plans and plots disrupted in the nick of time” - not a and all the big
strong
agencies and
defence but an invitation to keep trying. agencies and
bureaucracies have
bureaucracies have
– “Thinking outside the box” is the enemy’s strength but is exactly the
done a
done exactly the
wrong things, even
technique discouraged in various “noveau securité” the opposite of even
circles.
wrong things,
the opposite ofthis
this
• Recommendation sound strategy.
sound strategy.
– Need for more versatile programs and contracting vehicles.
• Applying “innocent until proven guilty” attitude into “plausible until
demonstrated otherwise”
• Mobility and transformability
• Unpredictability from the perspective of the enemy
– Need for “gateway intelligence systems” comparable to gateway
communications (e.g. Raytheon ACU-1000) that allow for
interoperability.
– Need for more than “Yada yada” – Yet Another Device Again
Copyright 2006 TETRAD Technologies Group, Inc.
5. Solutions
• One reconfigurable, easy, cheap, adaptable Martin, 7.jan.10:
Martin, 7.jan.10:
technology (applying what EE & IT learned long ago)Likeeven Obamaall
Like even Obama
admits now, and
admits now, and all
the smart Old-Guard
the smart Old-Guard
(retired) NSC and
(retired) NSC and
• Non-intrusive for mass transit, esp. air travel CIA guys are saying,
CIA guys are saying,
WE HAVE NO
WE HAVE NO
SYEM, NO
SYEM, NO
INTEGRATION, just
INTEGRATION, just
aalot of data
• Harder (for terrorists) to predict or get-around by lot of data
collection. This is
collection. This is
coming up with a modified chemistry or biology like being able to
like being able to
cut, split and stack
cut, split and stack
firewood, but have
firewood, but have
no stove in which to
no stove in which to
• Integrable with Existing Detection and Inspection burn it. what
burn it. what
happens? You
happens? You
Systems freeze to death.
freeze to death.
Copyright 2006 TETRAD Technologies Group, Inc.
6. Martin, 7.jan.10:
Martin, 7.jan.10:
This is not imaginary
This is not imaginary
but real and ready
JEDI (aka “CEBIT”)
but real and ready
for mfgr. and use - -
for mfgr. and use
the images at left
the images at left
Chemical Explosive Biothreat Identification are from working
and Tracking
are from working
prototypes, from
prototypes, from
2005 and earlier!!!
2005 and earlier!!!
AF123 – LAX –
DCL PWR
MEM
1234567-BROWNJ
MSL
PROC
(e.g., 4x4 cell Battery
array)
ACT
Copyright 2006 TETRAD Technologies Group, Inc.
7. Chemical Explosive Biothreat Identification and Tracking
JEDI / CEBIT
A solution that (economically, and ergonomically) CAN “cover all bases”
Components:
1. An extensible grid (array) of multi-spectral, multi-functional sensor elements – Not Only
For Explosives (but that is the Present Focus and Demand).
2. A chip set operating in a card package – self-contained, self-powered, easy, robust,
and very inexpensive.
3. A human factors system that is unobtrusive and can increase protection while
speeding up the inspection process.
4. Adaptable “engine” to meet future needs (especially “E” and “B” threats) As They
Emerge.
5. Aerosol concentrator auxiliary system to handle cases of extremely difficult
concentrations due to the nature of the compound or the operating environment.
6. A scalable architecture that can be operated as a network in a number of confined
physical environments or expanded to roadside/neighborhood outdoor operations.
Copyright 2006 TETRAD Technologies Group, Inc.
8. JEDI / CEBIT
CHECK-IN
Activation
Checked
Checked Carry-On
Checked
Martin, 7.jan.10:
Martin, 7.jan.10:
We were told by
We were told by
bureaucrats in DHS,
bureaucrats in DHS, Working
JIEDDO and TSWG Security (Std)
JIEDDO and TSWG Security (Std)
in 2005, 2006, 2007
in 2005, 2006, 2007
that all this was not
that all this was not
necessary because
necessary because
the problem was
the problem was
solved and under
solved and under
control - -I Ikid you
control kid you
not!
not! GATE Validation
Validation PRE-LOAD
Copyright 2006 TETRAD Technologies Group, Inc.
9. Chemical Explosive Biothreat Identification and Tracking
JEDI / CEBIT
Analysis based upon predictive, modeling-building order/lattice theory, inverse
methods, support vector algorithms, and related nonlinear reasoning models
♦ Reliance upon sensors, Bayesian PR, post-symptomatic reports alone is insufficient
♦ Greatest risk of missing the threat underway is in slow ability to rapidly plan and
coordinate response on multiple levels – similar as with biothreats – sensing agents,
decon, sampling, diagnosis, treatments
♦ Information Integration must occur at the micro (chip) level
♦ JEDI (CEBIT) learns from what worked and failed in similar system environments
♦ Confirmation and refinement of identified threats, false positives requires improved
methods – SVM and IRM (GENET) can provide better discrimination & classification
♦ Coordination of resources, teams, delivery, dissemination, disbursement requires
the approach used in CHAIN and COPF
Copyright 2006 TETRAD Technologies Group, Inc.
10. JEDI / CEBIT
Deformable Registration
Diffusion-Attraction
Mutual Information
Copyright 2006 TETRAD Technologies Group, Inc.
11. JEDI / CEBIT
Hierarchically ordered
networks of relations
(events)
Copyright 2006 TETRAD Technologies Group, Inc.
12. JEDI / CEBIT
NOT ONLY for Operation at TARGETS but at SOURCES
Copyright 2006 TETRAD Technologies Group, Inc.
13. Chemical Explosive Biothreat Identification and Tracking
JEDI CONOPS Model – built upon biological foundations
Copyright 2006 TETRAD Technologies Group, Inc.
14. Chemical Explosive Biothreat Identification and Tracking
Incident (Site) Prediction Example
Detections during span t1,2 Reported Indicators overlapping t1,2
IRM Predicted Convergence post-t2 Predicted Incidents post-t2
Copyright 2006 TETRAD Technologies Group, Inc.
15. Chemical Explosive Biothreat Identification and Tracking
The GIS components are essential for critical data and interactive human+machine analysis.
The missing ingredients are available and readily integrated with the mathematical analytics.
With architectures such as Nomad Eyes or Red Cell, the communication gaps can be
crossed for data gathering, verification, planning and response.
Copyright 2006 TETRAD Technologies Group, Inc.
16. NEXT STEPS Needed Now, Not After Another 9-11
JEDI / CEBIT
IS READY FOR FIELD TESTING AND PROTOTYPING
Actions Required:
One Agency that wants to take the lead in protecting their people, their country.
One specific flexible, receptive test environment (real airport, real neighborhood).
One firm step forward to enable co-creating the fieldable, working operational system.
One “break” from the monotony of the usual prolonged set of procedures and delays that
often are indirectly serving the aims of terrorists.
A few open doors.
A modest budget.
A unified team with the determination to stop those who want to destroy our lives.
Copyright 2006 TETRAD Technologies Group, Inc.
17. Contacts
TETRADYN (TETRAD Dynamics)
Martin Dudziak (Exec Chmn) 28 Chase Gayton Circle, Suite 731
– (757) 847-5511 Richmond, VA 23238 USA
– (804) 740-0342
– (202) 415-7295
– martinjd@tetradyn.com
– also see http://tetradyn.com/contact.php for more of the business team
21. CUBIT CONOPS Vision
Unified Communications from Every Perspective
Real-Time Situational Awareness: Decision-
makers can get the helicopters and HMMWVs
to the victims fast!
Get the Right Information to the Right
People for the Purpose of Saving Lives. Translating Data Visualization & Analysis
into concrete “go here, don’t go there”
messages
22. Coordinated Unified Biothreat Intervention and Tracking
• Verona™ is a field-tested intelligent
knowledge management and
discovery notebook [1]
• Command-Post-of-the-Future is now
in-the-present serving US forces [1]
• CMDRS [1] and other agent-based
situation awareness and knowledge
discovery components are readily
adaptable to Clinical Medicine,
Epidemiology, Disease Management
and Public Health applications
Copyright 2006 TETRAD Technologies Group, Inc.
23. Coordinated Unified Biothreat Intervention and Tracking
CHAIN Overview Chain
API Web
Monitor
Monitor V
Monitor
Monitor Clients
Agents
Monitor
Agents I
Agents
Agents
Agents E
Analysis
Analysis W Fat
Analysis Clients
Agents
Agents
Agents Intelligent Services C
Layer (ISL) N CMD
T Line
Notification L
Agents
Chain
Chain
Chain
Agents
Agents
Utilizes ISL for Agent Agents Intelligent Workflow Multiple Comm Protocols
Management - SOAP/HTTP
Coordination
- RMI/IIOP
CHAIN Implement Plans which Operate
on Events & Operator Direction
Engine
Communicate Knowledge Across
Monitor, Analysis, Notification Activities
- Query Databases, Repositories, Web Pages,
& Sensors Execute External Processes
- Monitor Critical Events Across the Globe Based on Results
- Intelligently Notify Users of Critical Events
Copyright 2006 TETRAD Technologies Group, Inc.
24. ISL Architecture
CMDRS Weather Data
Fire/Rescue
Desktop
Law Enforcement
Intelligent Services
D-COP Layer (ISL) Data
Data
Master Schedule Wrappe
Wrappe
rr
Unit Locations
Data
Data
Wrapper
Wrapper
Data
Data
Wrapper
Wrapper
Health Services
Traffic Data
Geological
National Guard Data
Coast Guard Public Services
25. LumINT: Knowledge Discovery
Intelligent Agents Analyst Portal Federated Search
GIS
Search
Le Monde
Al Jazeera
>>
and
Person… or
Organization
Ettelaat
Location not
Keyword Search Clear Reset Save as Search Agent
Search Agents
Knowledge Organizer Concept Analysis
Agent and Service based
Integration Framework
Best of Breeds COTS
Translation Visualization Link Analysis
26. LumINT Information Flow
Verity Chiliad
CHAIN Search
Federated
Agents Search Document
Collection
Indexes
Yahoo
LumINT News
J2EE KStore Mediator
WebApps
Verona Google
Notebook Search
Tool
Mediator QuickTime™ and a
Discovery TIFF (Uncompressed) decompressor
are needed to see this picture.
Service
Workflow
Controller Concept
Agent Analysis
Engine
Concept
Database
27.
28. *** Advanced
Visualizations
*** CASE Applications GUI CASE Evaluation Tools
Common Look and Feel Quantitative Analysis
Portal - Distributed Collaborative Content Sharing Workflow Manager
*** CASE Web Services Analyst Activity
and Agents Components Logger
Core Services and Agents ** Knowledge Representation
Common Infrastructure Components Mediator (e.g. OWL, KIF, CL, OKBC)
Information Sharing Policy Manager - Per-agency or per-analyst
Security Guard - (e.g. ISSE Guard, Radiant Mercury, InfoPump)
Grid Enabled Integration Framework - Plug-and Play of ALL components
Documents Message Streams
Knowledge Logger
RDBMS WWW Repositories Repository
Notes de l'éditeur
In the future, a victim of a crisis should be able to press a few buttons on a mobile phone, and instantly, an icon appears somewhere on an incident commanders map, telling him the victim ’ s location, status, and any pictures or audio reports. When we bring integrated micro-sensors into the field of vision, the incident commander can even get a read on the presence of any biological or chemical contaminants. I don ’ t know if you can make out this picture, but this is a photo sent by a London Underground bombing victim trying to get out of a subway station shortly after the 7/7 attacks. I remember watching this live on Fox News when it was happening. It really burned me up when I saw this, because it ’ s just another example of the private sector out-pacing the government in the exploitation of emerging technology. Why didn ’ t we have this during Katrina? How many people didn ’ t have to drown to death if their own homes if they could have gotten the right information to the people controlling the helicopters and the HMMWVs?