Topic Information Award/Contract Number Proposal Information Company Performance

Chem-Bio Sensors Employing Novel Receptor Scaffolds

NBCHC040074 04110123
(FY04.1 Phase I)
Chem-Bio Sensors Employing Novel Receptor Scaffolds

BioTraces, Inc
13455 Sunrise Valley Dr., Suite 200
Herndon, VA 20171-3296


The goal of this SBIR Phase I project is to develop supersensitive MPD enabled, binding assays for detection of BW agent using aptamers as the capture molecules instead of antibodies. Multi Photon Detection (MPD) is the most sensitive methods for protein detection and achieved a few zeptomole sensitivity. MPD enabled immunoassays will be developed first and from these Super-ELISA methods will be developed that will use not radioactive materials. Assays will be developed for one example of each type of BW agent: a protein toxin, botulism toxin, a bacterium, Bacillus anthracis, and a virus, Vaccinia as a surogate for smallpox. Sensitivities of about one virion per liter of air are expected, which is about 100-fold more sensitive than prior art P-chip-based detectors for multiple viral targets.<br><br>The broader impact of these activities lies in the application of proteomics methods to the detection of pathogens that have the potential to be used as biological weapons (BW) by armies or terrorists. The methods developed may deliver better tests for the rapid and sensitive detection of these pathogens. Such improved tests would improve the security of US troops in the field as well as the civilian population at home.<br>

Computer Modelling Tool for Vulnerability Assessment of U.S. Infrastructure

NBCHC040112 04111120
(FY04.1 Phase I)
Vulnerability Assessment Tool For Homeland Security

1344 Carpers Farm Way
Vienna, VA 22182-1347


Spatial Data Analytic Corporation`s (SPADAC) Vulnerability Assessment Tool For Homeland Security will be built on top of a Geospatial Information System (GIS) to provide a digital map that indicates areas of high concern. Spatial Feature Temporal Analysis will be used to allow for the capture and reuse of targeting signatures for any given group. The system will be built so that a signature can be generated for any set of spatial data, thereby offering commercial oppurtunities in other sectors. In addition to preparing a system conceptual design, SPADAC will derive initial signatures for two relevant terrorist groups. It will then be shown how these signatures can be applied to new areas of interest where historical events have not yet occurred.

Ship Compartment Inspection Device

NBCHC040117 04111094
(FY04.1 Phase I)
advanced ultrasonic inspection device

Ceres Biotechnology
800 East Clay Street
suite 16
Richmond, VA 23219-1534


What is proposed is a listener analysis of ultrasonic echoes generated in fluid filled tanks. Ultrasonic hearing humans is possible and the firm has a SBIR on a related device for the blind. The company also has the rights to an ultrasonic hearing air patent. The brain is capable of extracting the ultrasonic signal from the tank

Advanced Secure Supervisory Control and Data Acquisition (SCADA) and Related Distributed Control Systems

NBCHC040068 04110895
(FY04.1 Phase I)

12150 Monument Drive
Suite 510
Fairfax, VA 22033-4063


Legacy Supervisory Control and Data Acquisition (SCADA) has no cyber security - messages are in clear text; messages are unauthenticated; management commands are issued via dial up ports protected by weak passwords and administered by poor password administration practices. This results in either inadequate security or a potential for denial of service. Based on the type of utility infrastructure involved, an intelligent attacker, or threat agent, would focus his/her efforts on the appropriate vulnerability to cause the most damage possible. In the case of electricity, attacks through the backdoor maintenance ports may be more devastating than attacks through the front door SCADA network; by changing protective relay settings, the attacker can effectively disable all built-in protective circuitry within a portion of the electrical grid. In liquids utilities, i.e.; gas, oil and water pipelines, attacks through the front door SCADA network may be more devastating; by repeatedly issuing 'open valve' and 'close valve' messages, a "hammer effect" can be created which could rupture pipelines or damage valves and pumps.

Advanced Secure Supervisory Control and Data Acquisition (SCADA) and Related Distributed Control Systems

NBCHC040081 04111216
(FY04.1 Phase I)
CKM-based Management System for SCADA/DCS operations

1953 Gallows Road
Suite 220, VA 22182-4003


TecSec's CKM technology and tool kit will be used to develop an effective, easy to use, Secure Cryptographic Management System (SCMS) to protect SCADA systems/network. The management scheme will be designed to meet all unique requirements for SCADA/DCS operations, and provide a seamless migration of future protection schemes. The SCMS facilitates an RBAC methodology that can be set up to reflect the organizational units operating rules and procedures of an end user, and extends seamlessly the security procedures for SCADA/DCS operations. CKM technology systemizes key creation, implementing dual control or split knowledge by using key components to construct the final working key. This working key may be used in several ways including a session key, for a store-and-forward application such as e-mail, and for file encryption applications such as archiving, or protecting file information until accessed by a user.