PrintPrint

Awards

Topic Information Award/Contract Number Proposal Information Company Performance
Period
Award/Contract
Value
Abstract

H-SB05.2-002
UNCOOPERATIVE VEHICLE STOPPING USING NON-LETHAL METHODS

NBCHC060041 0521244
(FY05.2 Phase I)
Modulated Microwave Vehicle Stopping

Cybernet Systems Corporation
727 Airport Boulevard
Ann Arbor, MI 48108-1639

12/15/2005
to
06/30/2006
$99,459.00

Stopping vehicles, which are potential car bomb threats or are simply fleeing a crime scene at high speed allows military and law enforcement personnel added effectiveness. Furthermore, the current option of high-speed pursuit adds almost as much danger as might be avoided if the assailant is subdued. For this reason, many local police forces operating on a purely civilian mandate have stopped authorizing such high-speed pursuit for less serious crimes for the public safety.This solicitation calls for a means for stopping uncooperative vehicles (those that do not intentionally which to stop upon police or military request), which can be exercised safely from pursuit aircraft or automobile. We propose to develop a system that does this by transmitting modulated microwave energy to the target vehicle that is tailored to disrupt the computation functions of the vehicle engine controller, thus stopping the vehicle.

H-SB05.2-004
HARDWARE-ASSISTED SYSTEM SECURITY MONITOR

NBCHC060019 0521143
(FY05.2 Phase I)
HARDWARE-ASSISTED SYSTEM SECURITY MONITOR

Cybernet Systems Corporation
727 Airport Boulevard
Ann Arbor, MI 48108-1639

12/15/2005
to
06/30/2006
$99,894.00

Rootkits are Trojan horses installed by an intruder that mask changes that have been made in a system after attack. They replace or modify intrusion or other system status detecting applications so that they report a properly functioning system to a systems administrator, when in fact, the system has been compromised. Our solution to this requires designing a Linux based PC add on card that can monitor file access and prevent designated sectors from being written, as well as a memory scanner to catch memory resident rootkits. A GUI tool will allow an administrator to configure the device, which can only be accessed from a USB port. A valuable spin-off would be a bootable CD-ROM rootkit detection and repair tool for Windows.