Description:

TECHNOLOGY AREA(S): Electronics

OBJECTIVE: Development of a technology solution to provide Criminal/Terrorist Intent Determination allowing for real-time alerting. Potential solutions would identify personnel of interest and possible suspicious activities through various surveillance and security systems used in tactical base and installation security operations.

DESCRIPTION: The Army has limited capability to uncover potential threats based on Criminal/Terrorist Intent. To meet this challenge, predictive analytics is particularly useful. Predictive analytics solutions apply sophisticated statistical, data exploration, and machine-learning techniques to available information in order to help uncover hidden patterns. This gap presents a risk to personnel performing security operations at Entry Control Points and all personnel operating on a base or installation. Therefore, a need exists for Criminal/Terrorist Intent Determination at stand-off distances during Base Defense and Installation Operations. This includes automated, self-synchronous, cross cueing of sensor and surveillance systems allowing for recognition of Criminal/Terrorist Intent based on various biometric and behavior phenomenology. The scope is integration development for real-time person identification, object recognition, and activity detection of insider threat as well as forensic analysis. Potential solutions would provide real-time alerting of personnel and suspicious activities through integration of surveillance, video recognition, and body-camera imagery for tactical base and installation security operations. This could be achieved through automatic detection of suspicious activities through multiple camera and sensors systems that observe questionable behavior and biometric markers. This capability gap and technology shortfall relates to following Training and Doctrine Command Imperatives: Enhancing Expeditionary Capabilities-Expeditionary Maneuver; Army Warfighting Challenges #5 Counter Weapons of Mass Destruction, #6 Conduct Homeland Operations and #16 Set the Theater, Sustain the Force, Maintain Freedom of Movement. It also aligns with Army’s Science and Technology 30 Year Strategic Plan-Layers: Identity Layer reflecting Increased Stand-Off, Automated, Self-Synchronous Cross-Cueing between Sensors and Operator/Analyst and the Army’s Big 8 Capability #8 Advanced Protection with the Science and Technology Objective in the Army’s S&T Portfolio-Force Basing. Target transition timeframe is early Mid-Term. The specific transition acquisition programs are Integrated Base Defense and Integrated Installation Protection.

PHASE I: The Phase I activities will include conducting a feasibility study to determine the scientific, technical and commercial merit of the Criminal/Terrorist Intent Determination through technology concept. The technology concept will include continuous surveillance and body imagery from areas of interest of people or objects that could present a threat based on current or past actions, behavior, and activity. This Phase will demonstrate the feasibility of producing a demonstration software and hardware integrated with current operations and systems and will outline the demonstration success criteria.

PHASE II: Based on the design proposed in Phase I, produce software/hardware capable of interfacing with current and future security systems on bases and installations. The technology will provide continuous surveillance and body imagery from areas of interest of people or objects that could present a threat based on current or past actions. The intent is to identify through various technologies, potential criminals/terrorists before they have a chance to do harm. It will also include operational business rules that allowing for scalability, going beyond just facial recognition to adding specific objects and activities.

PHASE III: DUAL USE: It is envisioned that this SBIR solution will have “spin-on” military and “spin-off” commercial applications. Transition of the technology would be inclusion in the Army’s Physical Security 1-n Materiel Priority List for technology insertion into both Integrated Base Defense for tactical operations and Installation operations acquisition programs. MILITARY APPLICATION: Used in tactical environments such as Forward Operating Bases, predominately at Entry Control Points and Base operational area; and non-tactical environments such as Military Standard and Non-Standard Installations. COMMERCIAL APPLICATION: Commercial applications of this technology include use at major public and private events, airports, critical infrastructure and other key targets of Criminal/Terrorists.

REFERENCES:

1: Army Warfighting Challenges Online: http://www.arcic.army.mil/Initiatives/army-warfighting-challenges.aspx

2: Big 8 Capabilities Online: https://www.cna.tradoc.army.mil

3: The U.S. Army in Multi-Domain Operations 2028 Online: https://adminpubs.tradoc.army.mil/pamphlets/TP525-3-1.pdf

4: Predictive Analytics Online: https://www.predictiveanalyticstoday.com/predictive-modeling/

5: Installations of the Future: https://madsciblog.tradoc.army.mil/64-top-ten-takeaways-from-the-installations-of-the-future-conference/

KEYWORDS: Sensors, Biometrics, Predictive Analytics, Data Visualization, Visual Data Analytics And Optimization (image And Video), Data Fusion And Integration