PrintPrint

Awards

Topic Information Award/Contract Number Proposal Information Company Performance
Period
Award/Contract
Value
Abstract

H-SB04.1-002
Chem-Bio Sensors Employing Novel Receptor Scaffolds

NBCHC040074 04110123
(FY04.1 Phase I)
Chem-Bio Sensors Employing Novel Receptor Scaffolds

BioTraces, Inc
13455 Sunrise Valley Dr., Suite 200
Herndon, VA 20171-3296

04/01/2004
to
10/15/2004
$99,723.00

The goal of this SBIR Phase I project is to develop supersensitive MPD enabled, binding assays for detection of BW agent using aptamers as the capture molecules instead of antibodies. Multi Photon Detection (MPD) is the most sensitive methods for protein detection and achieved a few zeptomole sensitivity. MPD enabled immunoassays will be developed first and from these Super-ELISA methods will be developed that will use not radioactive materials. Assays will be developed for one example of each type of BW agent: a protein toxin, botulism toxin, a bacterium, Bacillus anthracis, and a virus, Vaccinia as a surogate for smallpox. Sensitivities of about one virion per liter of air are expected, which is about 100-fold more sensitive than prior art P-chip-based detectors for multiple viral targets.<br><br>The broader impact of these activities lies in the application of proteomics methods to the detection of pathogens that have the potential to be used as biological weapons (BW) by armies or terrorists. The methods developed may deliver better tests for the rapid and sensitive detection of these pathogens. Such improved tests would improve the security of US troops in the field as well as the civilian population at home.<br>

H-SB04.1-004
Computer Modelling Tool for Vulnerability Assessment of U.S. Infrastructure

NBCHC040112 04111120
(FY04.1 Phase I)
Vulnerability Assessment Tool For Homeland Security

SPATIAL DATA ANALYTICS CORPORATION
1344 Carpers Farm Way
Vienna, VA 22182-1347

05/02/2004
to
11/16/2004
$98,958.98

Spatial Data Analytic Corporation`s (SPADAC) Vulnerability Assessment Tool For Homeland Security will be built on top of a Geospatial Information System (GIS) to provide a digital map that indicates areas of high concern. Spatial Feature Temporal Analysis will be used to allow for the capture and reuse of targeting signatures for any given group. The system will be built so that a signature can be generated for any set of spatial data, thereby offering commercial oppurtunities in other sectors. In addition to preparing a system conceptual design, SPADAC will derive initial signatures for two relevant terrorist groups. It will then be shown how these signatures can be applied to new areas of interest where historical events have not yet occurred.

H-SB04.1-007
Ship Compartment Inspection Device

NBCHC040117 04111094
(FY04.1 Phase I)
advanced ultrasonic inspection device

Ceres Biotechnology
800 East Clay Street
suite 16
Richmond, VA 23219-1534

04/19/2004
to
11/01/2004
$100,000.00

What is proposed is a listener analysis of ultrasonic echoes generated in fluid filled tanks. Ultrasonic hearing humans is possible and the firm has a SBIR on a related device for the blind. The company also has the rights to an ultrasonic hearing air patent. The brain is capable of extracting the ultrasonic signal from the tank

H-SB04.1-008
Advanced Secure Supervisory Control and Data Acquisition (SCADA) and Related Distributed Control Systems

NBCHC040068 04110895
(FY04.1 Phase I)
SCADA IDS

SNVC
12150 Monument Drive
Suite 510
Fairfax, VA 22033-4063

04/01/2004
to
07/31/2004
$99,850.00

Legacy Supervisory Control and Data Acquisition (SCADA) has no cyber security - messages are in clear text; messages are unauthenticated; management commands are issued via dial up ports protected by weak passwords and administered by poor password administration practices. This results in either inadequate security or a potential for denial of service. Based on the type of utility infrastructure involved, an intelligent attacker, or threat agent, would focus his/her efforts on the appropriate vulnerability to cause the most damage possible. In the case of electricity, attacks through the backdoor maintenance ports may be more devastating than attacks through the front door SCADA network; by changing protective relay settings, the attacker can effectively disable all built-in protective circuitry within a portion of the electrical grid. In liquids utilities, i.e.; gas, oil and water pipelines, attacks through the front door SCADA network may be more devastating; by repeatedly issuing 'open valve' and 'close valve' messages, a "hammer effect" can be created which could rupture pipelines or damage valves and pumps.

H-SB04.1-008
Advanced Secure Supervisory Control and Data Acquisition (SCADA) and Related Distributed Control Systems

NBCHC040081 04111216
(FY04.1 Phase I)
CKM-based Management System for SCADA/DCS operations

TecSec
1953 Gallows Road
Suite 220, VA 22182-4003

04/01/2004
to
10/15/2004
$99,960.00

TecSec's CKM technology and tool kit will be used to develop an effective, easy to use, Secure Cryptographic Management System (SCMS) to protect SCADA systems/network. The management scheme will be designed to meet all unique requirements for SCADA/DCS operations, and provide a seamless migration of future protection schemes. The SCMS facilitates an RBAC methodology that can be set up to reflect the organizational units operating rules and procedures of an end user, and extends seamlessly the security procedures for SCADA/DCS operations. CKM technology systemizes key creation, implementing dual control or split knowledge by using key components to construct the final working key. This working key may be used in several ways including a session key, for a store-and-forward application such as e-mail, and for file encryption applications such as archiving, or protecting file information until accessed by a user.