Successfully ‘Connecting the Dots’ for

National Security & Intelligence

Our Solutions

Our software’s purpose is to maximize automation in high-volume-processing environments. The system does the ‘heavy lifting’ before handing over to humans, as and when necessary. It manages interactions between machines and/or humans by harnessing the power of data, shares intelligence across security missions for efficient multi-agency collaboration, thereby greatly reducing human errors. The more security systems that participate in Intelligence gathering, the more data that is considered, therefore, the better the intelligence that is harvested.

Click on the headings below to learn more


There is currently a ‘signal-to-noise’ problem, i.e. the dots do exists, but there are too many to piece together manually. This is compounded by the myriad of disparate / disjointed intelligence systems in use, and the sheer volume of information, which overwhelms intelligence analysts.

Our data-driven, automation technology intelligently filters out all the ‘normal’ information, and focuses instead on ‘exceptions’, revealing threats, and prequalifying potential perpetrators, whether they are flagged, or not. It ‘removes most of the hay from the haystack’, providing current, credible, focused, and actionable intelligence, while eliminating most of the human-related errors. The system is always on, always connecting the dots, and always proactively alerting the Counterterrorism (CT) Community. At the click of a mouse, it can produce comprehensive information on a person of interest, including ‘who, what, where, when, and how’.

Law Enforcement & Public Safety

Law Enforcement at the Federal, State, Local, and Tribal / Territorial levels is an integral part of any terrorism- or crime prevention efforts, therefore, the information and intelligence related to terror and crime needs to flow efficiently and securely, upstream, downstream and sideways (peer-to-peer) within the CT Community. Our system natively supports these collaborative capabilities that can make the collective efforts of Law Enforcement cohesive, coordinated, and efficient; potentially saving lives, protecting property, and apprehending perpetrators.

Emergency & CBRNE Management

In any Emergency or CBRNE (Chemical, Biological, Radiological, Nuclear and Explosive) Management situation, Time, Coordination and Situational Awareness are essential for Emergency and/or CBRNE Responder Teams to have the best chance of saving lives and property. First Responders rely largely on human and tactical device ‘signals’ to accomplish their goals. It is important for Responders to receive constantly-updated threat severity information signals, since they may be going into a potentially hazardous environment; and in order for them to make proactive decisions regarding alerting the public, or possibly ordering evacuations.

Our technology intelligently and discretely manages every type of signal and alert by its unique characteristics, and shares the necessary information with First Responders and the appropriate parties across Security Agencies.

Risk/Threat & Incident Management

Threats or Incidents can originate from: terrorism, criminal acts, intrusions, CBRNE alerts, infectious diseases, risks to transportation or infrastructure, etc. Regardless of the type of threat, it must be expeditiously managed based on its specific circumstances. There is currently a lack of a truly unified incident management system for inter-agency coordination, response, and follow-up activities.

Our solution provides a flexible communication framework that supports ‘playbooks’ for various threat scenarios, with multi-agency coordination, intervention and response protocols. It assigns: ownership, jurisdiction, chain-of-command, lead personnel, first responders; and, the responsibility and accountability for following up of high priority threats, with time-based escalation procedures, task monitoring, and incident tracking through to completion.

Command, Control & Communications (C3)

A flexible and unified Command, Control and Communication platform is essential for efficient collaboration across Security Agencies, First Responders, and the Public, that can accommodate the unique practices of each party with its personalization options.

Our solution’s C3 framework supports profile-based, multi-level security (with acting-for capabilities); information, message and document sharing; escalation rules and protocols; chain-of-command with seamless interaction; internal controls, and processing in both automated and manual modes.

Cargo Security & Customs

The Automated Commercial Environment / International Trade Data System (ACE / ITDS) was mandated by the ‘Customs Modernizations Act’ legislation, as the new ‘electronic processing system’ and primary driver for the CBP (Customs and Border Protection) modernization. ACE was the envisaged replacement Import / Export Processing and Border Security system, coupled with the ITDS’s information feeds for the needs of over 40 Federal Agencies. This system has cost more than $4 Billion, over 20 years, and has been labeled ‘a failed project’ for most of its existence, with apparent ‘data unreliability’ issues.

Our technology has a comprehensive and efficient replacement solution for ACE/ITDS offering real-time, credible data, which can be deployed in a fraction of the time, and at a fraction of the cost, while offering tremendous additional functionality for both Security and Commerce.

Border Security & Immigration

Over $1 Billion was spent on the initial South Border Initiative (a.k.a. SBInet) project to deploy tactical equipment on the Southern border that can sense illegal border crossings through the use of motion detectors, infrared and thermal scanners, video feeds, etc. The tactical devices were deployed successfully, but the overall project failed because the information from the devices could not be managed properly. The Commissioner of Customs and Border Protection (CBP) stated “It was missing a central processing system that could manage the events and signals from all the electronic monitoring devices deployed on the border”. Our solution was designed with this specific purpose in mind, and can provide the CBP Agents with real-time intelligence and geospatial information stemming from signals gathered from such tactical devices, which can identify and track illegal immigrants, together with their full history.

Passenger Screening

Passengers are screened prior to travel in order to identify and thwart terrorist, and other criminal acts such as smuggling of humans and illicit goods, but there are still too many vulnerabilities. TSA screening lines have recently also been at an all-time high. The Select Senate Committee on Intelligence’s probe into the Christmas Day bombing attempt found 14 failures that allowed the bomber to proceed, all of which our solution would have prevented while facilitating efficient flow through screening processes.

Our Passenger Screening solution is based on ‘perpetual’, thorough, automated, system-driven screening at every possible point in the travel cycle using up-to-date information, and provides instant threat detection information. Enhanced screening benefits include:

>  Automatic validation of Passenger data, Documents, and Visa issuance details;
>  Collection and validation of Biometric / Biographic information throughout the cycle;
>  Streamlined Checkpoint Screening Lines and reduced check-in and security times;
>  Provided systemic guidance to Security Personnel to eliminate Human Errors;
>  Improved Information Sharing and Collaboration among Security Partners; and,
>  Automatic checks for potential Overstays, and assistance in locating individuals.

Cargo Screening

Transportation of illicit cargo has the potential to result in terrorism or other illegal activities, and such threats exist in both commercial cargo and passenger baggage, across all modes of transportation (air, sea, land and rail). Many improvements can be realized in cargo and baggage screening, through automated system- and human-initiated cargo management processes.

Our Cargo / Baggage Screening solution seamlessly integrates tactical devices into screening security processes and automatically manages these with exception-handling, to reduce potential human error. Features of our screening solution include:

 Electronic Data Management of all Shipments, with full Audit Trails;
Electronic Management of Security Compliance Forms and Records;
>  Remote Access to all Shipment Information, regardless of location;
>  Active, Real-time Monitoring of all Shipment Activity, with Alerts;
>  Shipment Tracking – End-to-End, with Deviation Tracking; and,
>  Comprehensive Monitoring service for Shipping Containers.

Airport and Port Security

Studies concluded that Airport and Port security personnel do not rely primarily on procedures or rules in emergency or threat situations. They also quite often do not report suspicious activity. Security decision-making procedures must also be improved, both inside and outside of secured zones.

Our solution ‘technology-enables’ security processes, directing personnel regarding the actions they need to take based on their specific roles, thereby reducing human errors, and improving behavioral patterns, including in crisis-handling situations,

Supply Chain Security & Logistics

Many new measures in Transportation Security have adversely impacted the Supply Chain, due to more delays, and increased costs in both the public and private sectors. The United States is at a disadvantage to compete globally, since many other countries have not heightened their security standards. Addressing security efficiency is vital for the prosperity of our nation and its citizens. A strong, public-private collaboration is necessary; that also strengthens Intelligence gathering processes.

Our solution provides a multi-party framework that enhances processes in Security and Commerce, with one unified system that covers all modes of transportation. The system speeds up security processes and release times, and results in the efficient use of security and trading parties’ personnel. It also makes many affordable value-added services available to commercial trading partners.

Information Security

According to Government reports, most Agencies have a ‘moderate to high’ risk of being ineffective in managing their electronic records. After many serious data losses, including Wiki Leaks, and numerous successful cyber (hacking) attacks whereby Government and/or Prime Contractor information was stolen, solutions are urgently needed. The three main vulnerabilities in IT Security and Information Protection are: Data Leakage and Loss Prevention, Insider Threat Detection, and Intrusion Detection.

Attempts to protect information through hardware control have not worked. Our solution is strong on security and privacy, and provides system and data protections which are natively embedded in both the physical and logical information layers, protecting PII from inappropriate, unauthorized, or unlawful access. The system is inherently security-focused, and addresses all the above security challenges.

Critical Infrastructure Protection

By design, our technology provides an exceptional platform for the implementation of comprehensive physical security solutions, using a combination of automation and device integration, proactive management methods, and real-time processing. It can be used to secure and protect infrastructure, territorial boundaries, and assets; and it facilitates the effective security management needed to prevent losses and potential disasters. It can be deployed at: ‘four-wall’ / self-contained facilities, as well as in critical infrastructures such as ports, airports, utilities, etc.

Preparedness & Resilience

A National Preparedness System is aimed at strengthening the security and resilience of the nation, and can help achieve maximum preparedness to be able to counter threats, which can originate from acts of: terrorism, organized crime, natural disasters, pandemics, and transnational threats, etc. This calls for the Government’s closer collaboration with the Private Sector, and for more effective ways to communicate during crises. It requires identification and implementation of the tools, infrastructure, capabilities, organization and processes needed for emergency management operations, with strong inter-agency and inter-organizational coordination and communication. This is a massive undertaking which will undoubtedly be a combination of personalized solutions, with many components and role-players.

Our solution offers many of the required components for such a potential solution, and because they are already fully integrated, they can potentially form the framework for a National Preparedness System.


Device & Signal Management

Devices and sensors are used throughout security, transportation, infrastructure protection, etc., to limit the reliance on humans in ‘detection’ and ‘management’ activities. These devices and sensors generate and transmit electronic signals and data as part of their functions. Due to the ever-increasing use of such sensory equipment, there is a resulting signal and data overload. Signals must be processed efficiently for the equipment and associated processes to work properly. As example, in the SBInet project, the sensors worked well, but there wasn’t a system that could properly manage the signals, resulting in the failure of the project.

Our technology has been designed to automatically and intelligently manage large volumes of detection- and monitoring-device signals, data, and information, regardless of electronic formats or hardware platforms; and instantly communicate the information or alerts to people and systems that rely on it.

Identification & Access Control

There are two distinct layers in both Identification & Access Control: the ‘logical’ layer, which relates to use and privileges in the system, and the ‘physical’ which governs integration with external hardware infrastructures. Our technology identifies every direct or indirect ‘initiator’ of business processes in the system, and controls the activities of both people and devices through flexible ‘credentialing’ profiles which on the one hand guide them, but then also restrict their access in the system. Access Control is also personalized through role-specific security profiles, and a multitude of deployed hardware devices.

Tracking & Monitoring

Our solution offers comprehensive functionality for automated and active Tracking, with Deviation handling; and real-time Monitoring of: Cargo, People, Vehicles, Assets, Tactical Equipment, Information, and Business Processes; with all their related activities, and full historical lookup. The system seamlessly integrates with any tracking and management devices for heightened security, including management and monitoring of classified, dangerous, valuable, or hazardous conveyances; and Alert Management for events such as: container tampering, diversion of shipments, adverse inspection results, etc.

Human Capital Management

Studies have concluded that there is a gap between procedures, and the actual behavior of security personnel. Our solution introduces automation into security-related business processes which assists and directs personnel in every action they need to take, and also supports temporary ‘acting-for’ privileges. This role-based functionality also improves training and simulations, enhances operations, and speeds up the flow of processing. It relies on predefined expectations and constraints, allowing for ‘management-by-exception’ handling, which eliminates human errors that result from: lack of information, lapse in concentration, sheer volumes, poor judgment, failure to pinpoint problems or anomalies, and, delays in passing-on information.

Performance, Management & Oversight

It is important to be able to quickly and accurately pinpoint flaws in any business process, determine the cause and events resulting in the problem, and come up with a conclusive fix. Our solution provides immediate insight related to all events in the system, with real-time, dynamic, outcome-based and effective performance metrics dashboards, prevention statistics, analytical functions, and audit trails; without having to first manipulate the data. It also highlights shortcomings in the system such as bottlenecks and operational gaps, and provides direction for changes required to remedy the situation, and improve performance.

Security Forensics & Auditing

Security Forensics and Incident Investigations are necessary to ensure that personnel stay within the scope of their job descriptions, in order to prevent violations such as: fraud, corruption, malice, unintended or deliberate information leaks, sabotage, online theft, treason, illegal trading, intellectual property theft, money laundering, system intrusions and hacking, attacks against critical infrastructure, and attacks on financial payment systems. It is imperative to be able to immediately identify an attack and the perpetrators, and to stop it right away.

With our solution, the system immediately alerts designated people of breaches and/or violations, provides them with the evidence, and takes other necessary actions to stop any such breaches, offering complete visibility and transparency needed for follow up purposes.