Intelligence & Homeland Security

homeland securityUmbra Applied Technologies (UAT) is looking to develop and deploy an intelligence division which ensures that information related to homeland security threats is collected, analyzed, and disseminated to the full spectrum of homeland security customers in the Department, at state, local, and tribal levels, in the private sector, and in the Intelligence Community (IC).

UAT will work closely with department component intelligence organizations as well as state, local, tribal, and private-sector entities to ensure non-traditional streams of information are fused with traditional IC sources to provide a complete assessment of threats to the nation.

UAT seeks to optimize its customers capability to collect and analyze intelligence and information and produce finished analyses tailored to the needs of our key customers. UAT will provide the countrys leaders at all levels of government with a timely, actionable, and complete understanding of homeland security threats to facilitate informed decision-making, policies, and appropriate operational responses.

Cyber Security

cyberWorldwide estimates put the cost of cyber crime over $1 trillion annually. At UAT, we work with our clients to manage risk by providing mission-critical cyber security solutions, information technology, intelligence and analytical tools, and support solutions.

We work with our clients to collect and manage information to provide intelligence, maintain security, manage risk and strengthen resilience in today’s complex operating environment.

The U.S. government sector witnesses a blossoming of investments in cyber security technologies on the wave of progress that the White House and federal agencies have made in establishing interagency groups to plan and coordinate Comprehensive National Cybersecurity Initiative (CNCI) activities, setting up cyber security R&D goals and creating framework for industry-wide cooperation.

“The recent intrusions at the International Monetary Fund, the U.S. defense contractor Lockheed Martin, and at Citibank join those that occurred in the oil and gas sector, at NASDAQ, and at Google as further, troubling instances of a widespread and serious phenomenon. Even some companies employing sophisticated commercial defenses have fallen victim to intrusions that have compromised services and stolen intellectual property,” said Deputy Secretary of Defense William J. Lynn, speaking at the 28th Annual International Workshop on Global Security in Paris. To respond the cyber threat the U.S. Department of Defense (DOD) and Department of Homeland Security (DHS) have established a pilot program with leading private defense contractors and ISPs called DIB Cyber Pilot and that is only one of the many federal government programs driving the cyber security market.

Over the past few years a number of cyber attacks perpetrated by criminals, hackers and foreign nations against the U.S. Government’s networks rose sharply.

“Among the greatest concerns that impacts both military and civilian realms is cybersecurity,” James G. Stavridis, Navy Adm., NATO’s supreme allied commander for Europe and commander of U.S. European Command, told the Senate Armed Services Committee. “Today, we have a billion devices that are accessing the Internet,” he said. “Our economies are entangled in this Internet sea, and it’s an outlaw sea. Nothing exists in the norms of behavior. There is a military aspect to it, but it’s all of society. At some point, there needs to be a very global conversation on this challenge.”

“Federal agencies have spent more on cyber security than the entire GDP of North Korea, who some have speculated is to be involved with some of this cyber attacks,” said Senator Thomas. L. Carper. “The issue of Cyber Warfare is not science fiction anymore. It’s reality.”

3D Molecular Body Imaging

hero_24Non–evasive whole body scanning and imaging by chemical element. This means we can scan, identify and image anything on the periodic table thus, eliminating the need for “enhanced pat–downs” and saved images of recognizable or revealing body images. With this technology an individual is scanned molecularly and shown as an abstract humanoid image. The detection of contraband is the focus not “seeing” beneath ones clothes.

The same Gamma Resonance Absorption (GRA) technology used in our CDIS platform for Homeland Security Operations (HSO) has potential lifesaving applications in the medical field.

The focus is non–intrusive resonance techniques, investigating the viability of Gamma Resonance, Gamma Resonance Fluorescence and other technologies for the purpose of diagnosing and treating diseases. This is executed through non–invasive whole body composition scanning and imaging by chemical element. Further research is under way to develop superior scanning to measure for early detection of Cancer cells by differentiating Cancer cells from normal cells.

This technology surpasses CAT scan, MRI and PET Scan in its unique capability to image the human body by chemical element. Can detect and image down to the molecular structure of an individual cell and detect as well as identify any anomalies. This should drastically reduce misdiagnosis and prevent the loss of precious life saving time for critically ill patients.

Veritas (Emotion & Reaction Analyzer)

hero_20Veritas is a full-scale automated facial expression and voice analysis solution used to gather accurate, objective, and detailed information about the emotions of the target/interviewee.

UAT’s professional/security level emotion and reaction analyzer used for deception detection is based on our D.V.A (Dynamic Voice Analysis) technology and advanced face modeling. It can give you an indication about the way the tested parties feel while they speak, and alert you to possible deception events. Veritas takes into consideration the Facial Action Coding System (FACS) system to taxonomize human facial movements by their appearance on the face and assess ¨emotional state/intention¨. Using FACS, human coders can manually code nearly any anatomically possible facial expression, deconstructing it into the specific Action Units (AU) and their temporal segments that produced the expression.

Veritas is designed for security officials, governmental agencies, law enforcement and military. It allows for faster truth verification, making the investigative process more effective and efficient.

Warning: All labels, products, processes and technologies described in this website are either patented, have patents pending or are copyrighted or trademarked. If you are interested in licensing any of the labels, products, processes or technologies, please contact Umbra Applied Technologies, Inc., 51 JFK Parkway, First Floor West, Short Hills, NJ 07078, Att: Privacy Office, (855) 862-7228, uatpo@umbraappliedtechnologies.com

Intelligence & Homeland Security

homeland securityUmbra Applied Technologies (UAT) is looking to develop and deploy an intelligence division which ensures that information related to homeland security threats is collected, analyzed, and disseminated to the full spectrum of homeland security customers in the Department, at state, local, and tribal levels, in the private sector, and in the Intelligence Community (IC).

UAT will work closely with department component intelligence organizations as well as state, local, tribal, and private-sector entities to ensure non-traditional streams of information are fused with traditional IC sources to provide a complete assessment of threats to the nation.

UAT seeks to optimize its customers capability to collect and analyze intelligence and information and produce finished analyses tailored to the needs of our key customers. UAT will provide the countrys leaders at all levels of government with a timely, actionable, and complete understanding of homeland security threats to facilitate informed decision-making, policies, and appropriate operational responses.

Cyber Security

cyberWorldwide estimates put the cost of cyber crime over $1 trillion annually. At UAT, we work with our clients to manage risk by providing mission-critical cyber security solutions, information technology, intelligence and analytical tools, and support solutions.

We work with our clients to collect and manage information to provide intelligence, maintain security, manage risk and strengthen resilience in today’s complex operating environment.

The U.S. government sector witnesses a blossoming of investments in cyber security technologies on the wave of progress that the White House and federal agencies have made in establishing interagency groups to plan and coordinate Comprehensive National Cybersecurity Initiative (CNCI) activities, setting up cyber security R&D goals and creating framework for industry-wide cooperation.

“The recent intrusions at the International Monetary Fund, the U.S. defense contractor Lockheed Martin, and at Citibank join those that occurred in the oil and gas sector, at NASDAQ, and at Google as further, troubling instances of a widespread and serious phenomenon. Even some companies employing sophisticated commercial defenses have fallen victim to intrusions that have compromised services and stolen intellectual property,” said Deputy Secretary of Defense William J. Lynn, speaking at the 28th Annual International Workshop on Global Security in Paris. To respond the cyber threat the U.S. Department of Defense (DOD) and Department of Homeland Security (DHS) have established a pilot program with leading private defense contractors and ISPs called DIB Cyber Pilot and that is only one of the many federal government programs driving the cyber security market.

Over the past few years a number of cyber attacks perpetrated by criminals, hackers and foreign nations against the U.S. Government’s networks rose sharply.

“Among the greatest concerns that impacts both military and civilian realms is cybersecurity,” James G. Stavridis, Navy Adm., NATO’s supreme allied commander for Europe and commander of U.S. European Command, told the Senate Armed Services Committee. “Today, we have a billion devices that are accessing the Internet,” he said. “Our economies are entangled in this Internet sea, and it’s an outlaw sea. Nothing exists in the norms of behavior. There is a military aspect to it, but it’s all of society. At some point, there needs to be a very global conversation on this challenge.”

“Federal agencies have spent more on cyber security than the entire GDP of North Korea, who some have speculated is to be involved with some of this cyber attacks,” said Senator Thomas. L. Carper. “The issue of Cyber Warfare is not science fiction anymore. It’s reality.”

3D Molecular Body Imaging

hero_24Non–evasive whole body scanning and imaging by chemical element. This means we can scan, identify and image anything on the periodic table thus, eliminating the need for “enhanced pat–downs” and saved images of recognizable or revealing body images. With this technology an individual is scanned molecularly and shown as an abstract humanoid image. The detection of contraband is the focus not “seeing” beneath ones clothes.

The same Gamma Resonance Absorption (GRA) technology used in our CDIS platform for Homeland Security Operations (HSO) has potential lifesaving applications in the medical field.

The focus is non–intrusive resonance techniques, investigating the viability of Gamma Resonance, Gamma Resonance Fluorescence and other technologies for the purpose of diagnosing and treating diseases. This is executed through non–invasive whole body composition scanning and imaging by chemical element. Further research is under way to develop superior scanning to measure for early detection of Cancer cells by differentiating Cancer cells from normal cells.

This technology surpasses CAT scan, MRI and PET Scan in its unique capability to image the human body by chemical element. Can detect and image down to the molecular structure of an individual cell and detect as well as identify any anomalies. This should drastically reduce misdiagnosis and prevent the loss of precious life saving time for critically ill patients.

Contraband Detection & Imaging System (CDIS)

hero_19

CDIS units are used for non–intrusive detection and imaging systems based on Gamma Resonance Fluorescence, Gamma Resonance Absorption, Gamma induced Photofission and other proprietary technologies combined. This provides the unique capability to detect and image threats such as explosives, nuclear weapons and materials, chemical warfare components, drugs, contraband and emerging threats specifically by chemical element without the need for operator interpretation and analysis of images or data with a greater than 95% accuracy. This allows high detection probability without false alarms. The system designs are customized for specific applications which include imaging 2D, 3D tomographic of the total contents and the specific threats simultaneously. The unique attributes of this technology also provides standoff and remote detection for military applications for detection of improvised explosive devices (IED’s) car and truck bombs at safe distances to provide adequate time to respond.

CDIS is a system designed to detect and image all types of explosive materials (liquid and solid), chemical and biological warfare components, radioactive or nuclear materials and nuclear weapons (shielded and unshielded), drugs, contraband and new emerging threats. Detection is specifically accomplished by chemical element.

CDIS, will be the only existing technology capable of simultaneously detecting multiple threats with better than 95% accuracy and without the need for monitoring personnel to interpret the detected images.

System Characteristics include:
Flexible, open architecture capable of integration with other screening technologies; turn-key operation with minimum operating personnel and training; automatic alarms and location coordinates that eliminate the need for operator interpretation of complex radiographic images.

Multiple inspection stations can be operated from the same gamma production system. The electronics readout and displays may be centralized and remote from the screening stations through wireless technology. The use of advanced gamma resonance techniques puts this system in a class of its own, far superior to other scanning systems in performance and capability.

The system accurately and rapidly locates concealed explosives, improvised nuclear devices (IND), and special nuclear materials (SNM) such as uranium and plutonium, even behind thick shielding. The key feature is the use of several inspection processes in parallel to enhance detection efficiency and reduce false alarms. The system uses proven, commercially available equipment. It can be utilized in various configurations for specific applications such as port security container inspection; airport security inspection of carry-on baggage, checked baggage, cargo, bulk mail, LD-3 containers and vehicles; DOD applications for portal (checkpoint), remote and standoff detection of improvised explosive devices (IED’s), car and truck bombs.

The basic system utilizes precisely tuned high-energy, gamma ray beams to resonate with the specific chemical elements and isotopes of interest to be detected thereby allowing unambiguous detection and identification of the threat materials even through shielding and clutter of other materials rapidly and reliably. This key feature provides the capability to fully automate systems to identify threats without the need for operator interpretation of image or data.

The interaction of the specifically tuned gamma ray beams with the elements and isotopes that represent threats are identified by gamma nuclear resonance fluorescence, gamma nuclear resonance absorption, gamma induced photo fission and may be combined with other modalities for additional capabilities.

The imaging capabilities include 2D, 3D, 3D Tomographic of total contents for verification of manifest and simultaneous 2D, 3D, 3D Tomographic of specific threats. Automated threat algorithms identify the threats by type, quantity and location.

Veritas (Emotion & Reaction Analyzer)

hero_20Veritas is a full-scale automated facial expression and voice analysis solution used to gather accurate, objective, and detailed information about the emotions of the target/interviewee.

UAT’s professional/security level emotion and reaction analyzer used for deception detection is based on our D.V.A (Dynamic Voice Analysis) technology and advanced face modeling. It can give you an indication about the way the tested parties feel while they speak, and alert you to possible deception events. Veritas takes into consideration the Facial Action Coding System (FACS) system to taxonomize human facial movements by their appearance on the face and assess ¨emotional state/intention¨. Using FACS, human coders can manually code nearly any anatomically possible facial expression, deconstructing it into the specific Action Units (AU) and their temporal segments that produced the expression.

Veritas is designed for security officials, governmental agencies, law enforcement and military. It allows for faster truth verification, making the investigative process more effective and efficient.

Warning: All labels, products, processes and technologies described in this website are either patented, have patents pending or are copyrighted or trademarked. If you are interested in licensing any of the labels, products, processes or technologies, please contact Umbra Applied Technologies, Inc., 51 JFK Parkway, First Floor West, Short Hills, NJ 07078, Att: Privacy Office, (855) 862-7228, uatpo@umbraappliedtechnologies.com