PrintPrint

Awards

Topic Information Award/Contract Number Proposal Information Company Performance
Period
Award/Contract
Value
Abstract

H-SB05.2-002
UNCOOPERATIVE VEHICLE STOPPING USING NON-LETHAL METHODS

NBCHC060041 0521244
(FY05.2 Phase I)
Modulated Microwave Vehicle Stopping

Cybernet Systems Corporation
727 Airport Boulevard
Ann Arbor, MI 48108-1639

12/15/2005
to
06/30/2006
$99,459.00

Stopping vehicles, which are potential car bomb threats or are simply fleeing a crime scene at high speed allows military and law enforcement personnel added effectiveness. Furthermore, the current option of high-speed pursuit adds almost as much danger as might be avoided if the assailant is subdued. For this reason, many local police forces operating on a purely civilian mandate have stopped authorizing such high-speed pursuit for less serious crimes for the public safety.This solicitation calls for a means for stopping uncooperative vehicles (those that do not intentionally which to stop upon police or military request), which can be exercised safely from pursuit aircraft or automobile. We propose to develop a system that does this by transmitting modulated microwave energy to the target vehicle that is tailored to disrupt the computation functions of the vehicle engine controller, thus stopping the vehicle.

H-SB05.2-002
UNCOOPERATIVE VEHICLE STOPPING USING NON-LETHAL METHODS

D07PC75296 (formerly NBCHC070094) 0522006
(FY05.2 Phase II)
Microwave Vehicle Stopping

Cybernet Systems Corporation
727 Airport Boulevard
Ann Arbor, MI 48108-1639

04/25/2007
to
04/24/2010
$749,956.00

Cybernet Systems is developing a novel, non-lethal method for disabling an uncooperative vehicle called the MVS, or Microwave Vehicle Stopper. Our system transmits modulated microwave energy to the target vehicle that is tailored to disrupt the computation functions of the vehicle engine controller, safely slowing and stopping the vehicle. Inducing a car to stall without permanent damage is generally termed "vehicle upset". Our goal is to defuse a potentially dangerous car-chase by disabling power to the vehicle while leaving braking and steering unaffected. This system will provide law enforcement with a non-lethal tool for stopping vehicles in the safest possible manner.Our proposed Phase II effort is an extension of the successful Phase I project. We clearly showed feasibility of using microwaves to upset vehicles in Phase I, and in Phase II we will refine the modulation schemes, validate the modulation patterns on multiple test vehicles, and will develop hardware prototypes. Functional Phase II systems will allow us to demonstrate the technology to user groups (law enforcement), police offices and government personnel. Ongoing interaction between Cybernet and users of the MVS (such as local police) is a particularly important strategy for developing a commercially viable product.

H-SB05.2-004
HARDWARE-ASSISTED SYSTEM SECURITY MONITOR

NBCHC060019 0521143
(FY05.2 Phase I)
HARDWARE-ASSISTED SYSTEM SECURITY MONITOR

Cybernet Systems Corporation
727 Airport Boulevard
Ann Arbor, MI 48108-1639

12/15/2005
to
06/30/2006
$99,894.00

Rootkits are Trojan horses installed by an intruder that mask changes that have been made in a system after attack. They replace or modify intrusion or other system status detecting applications so that they report a properly functioning system to a systems administrator, when in fact, the system has been compromised. Our solution to this requires designing a Linux based PC add on card that can monitor file access and prevent designated sectors from being written, as well as a memory scanner to catch memory resident rootkits. A GUI tool will allow an administrator to configure the device, which can only be accessed from a USB port. A valuable spin-off would be a bootable CD-ROM rootkit detection and repair tool for Windows.

H-SB05.2-004
HARDWARE-ASSISTED SYSTEM SECURITY MONITOR

NBCHC070050 0522003
(FY05.2 Phase II)
Hardware-based Computer Security System

Cybernet Systems Corporation
727 Airport Boulevard
Ann Arbor, MI 48108-1639

04/30/2007
to
04/29/2010
$749,937.00

Rootkits are programs that hide pieces of software from the operating system. Rootkits replace or modify intrusion and system status applications, falsely reporting a clean system, when in fact the system has been compromised. A recent McAfee article stated rootkit infections for Windows-based PCs were up 700% for first quarter 2006, and this trend is expected to continue. A compromised system cannot audit itself; our solution relies on a PCI-Express add-on card running Linux that can monitor file accesses, prevent designated sectors modification, and can scan physical memory. This card provides a physically isolated process that monitors the host system, making it impossible for a rootkit to hide completely on the host. The card also logs forensic information and monitors network traffic to scan for malicious behavior. Software developed for our Phase I feasibility study demonstrated that our key components, file hashing and memory scanning, are capable of detecting current and expected rootkit technologies.Another component allows enterprise administration and information gathering across large organizations, and aggregates periodic information snapshots for security auditing and forensics. Requiring physical USB port access for configuration is an option.A bootable CD-ROM rootkit detection and repair tool for Windows would be a valuable spin-off.