1 / 24

CII’s International Conference 2010 on Internal Security

CII’s International Conference 2010 on Internal Security. 29 th July 2010 Shambhuling R. Doddamani, Scientist ‘E’, F-INSAS, LIC & WSI Division Centre for Artificial Intelligence and Robotics(CAIR) Defence Research and Development Organization(DRDO), Bangalore.

Télécharger la présentation

CII’s International Conference 2010 on Internal Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CII’s International Conference 2010 on Internal Security 29th July 2010 Shambhuling R. Doddamani, Scientist ‘E’, F-INSAS, LIC & WSI Division Centre for Artificial Intelligence and Robotics(CAIR) Defence Research and Development Organization(DRDO), Bangalore “COMMUNICATION & INFORMATION TECHNOLOGIES, CYBER SECURITY”

  2. Agenda • Terrorist Activity Chain • Safe City Requirements • Internal Security ICT Requirements • Technology Needs and Components • Internal Security Mission and Architecture • Risks and Benefits of Network Technologies • Communication Challenges • Safe City Tools • Technical Architecture • SA, WLS, SAT • Cyber Security • Summary & Conclusion

  3. Terrorist Activity Chain

  4. Safe City Requirements Safe City is to build trust, share information and leverage technology to deter and reduce terrorism & crime in city • Digital CCTV system of cameras at major locations • IP based Wireless Video Surveillance, Integration of video, Video Analytics, Internet and other technology to provide real-time intelligence sharing, Tracking and Navigation • Web-based alert network for notifications • Infrastructure less communication, Enhanced radio communications with private/corporate security, Traffic/Transit Police and CP • CCTV monitored by CP, private/corporate security and Traffic/Transit Police.

  5. Internal Security ICT Requirements • Tools to quickly interpret large data holdings • Software for information fusion in immense data environments • Innovative, interactive computer & communication system interfaces • Integrated visualization of time and space features • Perform predictive data mining analysis and modeling simulation • Handle all types of multimedia (text, audio, video), geographic information system mapping, imagery, graphics, and analytical data • Information and Communication security

  6. Technology Needs • Information Sharing and Communication • Data fusion to support Common Operation Picture (COP) • Distribution of intelligence reports • Information sharing within and across sectors on terrorist threats • Situational awareness, Decision support and Predictive analysis • Cyber Security • Secure Internet protocols • Capability to model the effects of cyber attacks • Scalable secure system • Managing the identities, rights and authorities • Threat detection models • Interoperability • Wireless broadband data technologies and applications • Emergency-information sharing and data exchange • Seamless access to voice and data networks • Interoperability compliance

  7. Technology Components • Audio Conferencing • Computer-Aided Design • Data Integration • Digital Rights Management • E-mail • Enterprise Application Integration • Information Mapping/Taxonomy • Instant Messaging • Legacy Integration • Real Time/Chat • Record Linking Association • Shared Calendaring • Software Development • Threaded Discussion • Video Conferencing

  8. Internal Security Architecture Imaging Geo Spatial Fusion TETRA Dispatch

  9. Identify threats to and vulnerabilities of Internal Security Prevent incidents Disseminate Information Respond to incident Recover from incident “Secure the Internal, its People, Assets, and Interests” Prepare for incidents Facilitate the Flow of People and Goods Develop Plans and Performance Measures Manage Knowledge and Intelligence Information Perform Research and Development Develop Policy Manage Human Resources Manage Technology Manage Grants, Procurements, and Acquisitions Manage Legal Activities Manage Facilities and Property Manage Budget & Finances IS Mission • Secure Indian against terrorist attacks • Ensure an effective response in the event of crises and natural disasters • Administer our immigration system • Facilitate legitimate trade and travel and • Guard the safety of Sea Shore/ water ways

  10. GIS in Internal Security • Strategic planning • Identification of future opportunities, vulnerabilities, risks, and threats that, provides a framework to make critical decisions in an emergency situation. • Common operational picture • COP can be obtained through the use of multiple technologies and/or media synthesized on their common location element. • Critical infrastructure protection • Data collection projects have generated a significant amount of interest in using GIS technologies. GIS enables the ability to model events and geo-spatially determine risk potential and mitigation alternatives. • Emergency Operations Centers • GIS is rapidly becoming the platform that integrates dynamic information and displays the location of events and their impacts • Data fusion • Data fusion centers are challenged with acquiring data in a variety of formats from a variety of sources and quickly integrating this data into meaningful, actionable information to prevent crimes and attacks and apprehend perpetrators. GIS provides data fusion centers with powerful tools to meet these challenges. • Response exercises • GIS enhances virtual and physical response exercises by geographically pinpointing and visually displaying threats and hazards in conjunction with other geographic data

  11. Internal Security Information Network

  12. Secure Embedded OS • Access control • Information encryption • Information isolation • Technology considerations • Feature trade-offs • Security evaluation • Standards conformance • Hardware support

  13. IS Communication Infrastructure HS applications are based on high speed, secure, redundant communication backbone, which links system units with each other The data are collected and sent via alternatives including: Satellite connections MAN, WAN (Wimax) LAN (Wi-Fi) Radio Terminals Microwave Links Fiber Optic Links Wire Line

  14. Community Networks Critical Infrastructure Emergency Services Retail Public Internet Law Enforcement Bank Managed IP Network School Hospital Private Radio Network Airport/Seaport Wire LineNetworks Convergence Wireless LAN Network Homeland Security 2.5G, 3G, and 4G Wireless Networks Power/Water Treatment Plants Protecting Networks • Identify and mitigate spam, viruses and other malware • Analyze and help mitigate security breaches • Conduct security audits for enterprise and government customers • Provide testing and certification for security products and network connected devices • Offer parental controls and security products

  15. Risks and Benefits of Network Technologies

  16. Communication Challenges Voice, Video, & Data Integrated Solution Rapid Deployment Interoperability Ease of Operation Quality & Security Slide 16

  17. Safe City Tools • E-groups: • Messaging networks connecting businesses and police • Photo Sharing: • Distribution of photos showing individuals who have committed illegal or unsafe acts. • Information Sharing: • Ongoing sharing of written documentation, e-mail information and regular meetings. • Security Cameras: • A network of strategically placed security cameras allow police to monitor hightraffic areas and prioritize their response. • Police Resources Allocation: • Other cities have observed drastic crime reduction, increased prosecution rates and lower court costs in areas where cameras have been distributed. These reductions allow police resources to be more responsive to community and business concerns.

  18. Application Configuration Pattern: N-Tier, Dynamic Web Service Component Service Component ApplicationControl Interface Service Component Primary Patterns Workflow/BPM Data Access Rules Engine Business Intelligence/Data Warehouse Pervasive Device Support Portal Integration/ Interoperability Broker Secondary Patterns Pattern Matching Content Management Web Services Personalization Router Message-Oriented Middleware Asynchronous Access Decomposition Agent Cross-Cutting Patterns Collaboration Security Performance and Reliability Technical Architecture - Application Patterns

  19. Situation Awareness State-of-the-art LICO System for controlling and analyzing Communication (COM) segment to produce COMINT, which aids commanders in making effective and efficient battlefield decisions. Situation Awareness system for LIC operations comprising following subsystems: Customized Indigenous GIS with 2525B/APP6 Std Mil Symbol library Navigational capabilities, with/without GPS VMF/ADATP3 Integrated Message Management Communication, Reception and Transmission of Messages & Overlays Command & Control (C2) capabilities Common Operating Picture (COP) Video Streaming Identification of Friend or Foe Mission Planning and Troop Leading Procedures(TLP) After Action Review(AAR) and Debriefing

  20. Wireless Location Signatures • Scalable and reliably location technology that provides high accuracy of positional information across all types of environments. • Wireless Location Signatures (WLS) technology is based on the observation that the radio environment varies from location to location, and if enough elements of the RF environment can be measured with sufficient accuracy, each set of measured values will provide an RF signature that uniquely identifies a particular location

  21. Situation Assessment Tool(SAT) SAT(Situation Assessment Tool) assists to assess the commander in assessing current enemy courses of actions. Determination of the current situation is a key function of surveillance command center after the target identity is established, the information is further analysed with the help of knowledge about terrorist activities and tactics of enemy to ascertain the Identity , Capability and intent of unit. SAT Processes • Key Features • Multi-user stand-alone model or client-server architecture based model. • Supports multiple excises • User-friendly Graphical User Interface evolved through extensive user trials • Hierarchical knowledge presentation • Importing of Int Report and Indicators from external databases and CSV files • GIS integration via common database • Spatial and temporal based triggers to accelerate knowledge capturing process • Key Features (Cont…) • Built-in short cuts and accelerator, as suggested by users • On demand generation of summary of Result and Backtracking • Advance report generation and database options for expert users • Auto connection to database server connection • Online help system • User-friendly installation software • Hardware platform: Desktop, UMPC and Laptop

  22. Cyber Security • Scalable trustworthy systems (including system architectures and requisite development methodology) • Enterprise-level metrics (including measures of overall system trustworthiness) • System evaluation life cycle (including approaches for sufficient assurance) • Combating insider threats • Combating malware and botnets • Global-scale identity management • Survivability of time-critical systems • Situational understanding and attack attribution • Provenance (relating to information, systems, and hardware) • Privacy-aware security • Usable security

  23. Summary & Conclusion • World-class, end-to-end comprehensive Defence & Internal Security solutions • Communications, SA, SAT, C4, GIS, Intelligence, Analysis, Operations • Cutting-edge Technology at component level • WLS • GIS • C4I • Recce & Surveillance • SAT • DRDO’s Technologies as a Force Multiplier

  24. Please Visit CAIR-DRDO Stall No. OD 1 in HALL ‘A’ Thank You For Further Information, Systems & Product: Contact Us At: director@cair.drdo.in

More Related