PrintPrint

Awards

Topic Information Award/Contract Number Proposal Information Company Performance
Period
Award/Contract
Value
Abstract

H-SB09.1-004
Decision Analytic Approaches for CBRN Terrorism Risk Assessment

NBCHC090039 0911100
(FY09.1 Phase I)
TRAnalyst(tm): Terrorism Risk Analyzer for CBRN Threats

Intelligent Systems Technology Inc
12122 Victoria Ave.
Los Angeles, CA 90066-3118

05/22/2009
to
12/07/2009
$99,952.22

Project Summary. The analysis of CBRN terrorism risks is a national priority and a DHS imperative. To enable such analysis, requires tools that facilitate decision making based on identified risks. The tools available address risk assessment but not risk management. Furthermore, these tools do not model intelligent adversaries when conducting threat/risk assessment. This SBIR is concerned with developing and implementing a prototype decision analysis methodology for CBRN Terrorism Risk Analysis that overcomes these limitations. The methodology is intended to support Weapons of Mass Destruction (WMD) medical countermeasure decision making. The proposed approach augments Probabilistic Risk Analysis with simpler decision-analytic approaches for both risk assessment and risk management, and incorporates an intelligent adversarial model within its threat representation. Phase I of this effort is concerned with producing a functional prototype for CBRN Terrorism Risk Analysis that can be implemented and available on standard personal computers. Anticipated Benefits/Potential Applications. The overall methodology is expected to become part of strategic planning tools used in government and industry. Potential applications include cyber network infrastructure protection, business continuity planning, and counter-insurgency operations planning.

H-SB09.1-004
Decision Analytic Approaches for CBRN Terrorism Risk Assessment

N10PC20261 0914008
(FY09.1 Phase II)
TRAnalyst(tm): Terrorism Risk Analyzer for CBRN Threats

Intelligent Systems Technology Inc
12122 Victoria Ave.
Los Angeles, CA 90066-3118

08/06/2010
to
10/26/2011
$464,437.53

Protecting against CBRN attacks requires an understanding and identification of the aspects, assessment of vulnerabilities, determination of potential impacts, and development and allocation of the most cost-effective, productive countermeasures and defense. Conducting such analyses requires tools that facilitate decision making based on identified risks. To this end, Phase I of this effort produced and demonstrated a decision-analytic methodology and corresponding proof-of-feasibility demonstration prototype to: discriminate CBRN threats by risk; conduct sensitivity analyses to understand key risk drivers; and evaluate medical countermeasures risk management strategies. Phase II of this effort is concerned with using the Phase I methodology to produce a fully-functional CBRN Terrorism Risk Assessment Tool that enables analyses of key risk drivers and evaluation of medical countermeasures strategies for a full range of CBRN Terrorism threat scenarios as documented in the National Planning Scenarios publication.

H-SB09.1-006
Highly Scalable Identity Management Tools

NBCHC090046 0911015
(FY09.1 Phase I)
Secure Identification and Authentication Mechanism

Physical Optics Corporation
20600 Gramercy Place, Building 100
Torrance, CA 90501-1821

05/15/2009
to
11/30/2009
$99,997.00

To address the HSARPA need for a strong and reliable identification and authentication (I&A) mechanism for secure and reliable systems by enabling authentication of all system components and individuals, Physical Optics Corporation (POC) proposes to develop a new Secure Identification and Authentication Mechanism (SIAM) technology. Proposed technology is based on the implementation of unique fingerprints for all system components and a novel unbreakable bit-level encrypting method. SIAM fingerprinting is software to unbreakably encrypt the component`s data, thus providing reliable component-level I&A; eliminating the security gaps of traditional methods; and detecting/preventing system misuse, intrusion, and exploitation. In Phase I, POC will demonstrate the feasibility of SIAM by developing and testing a system TRL 4 prototype based on existing IT technologies that will simulate enterprise level architecture and include all basic secure system components. In Phase II, POC plans to develop a full-scale TRL 6 system prototype capable of allowing reliable I&A for all system components, providing secure sensitive information sharing, and improving the management and distribution of electronic security policies and roles with a reduced system cost. SIAM will benefit government and commercial applications, including federal and border security systems, financial services, complex global enterprise networks, and Internet security.