what are appropriate border surveillance technologies?

18
What are Appropriate Border Surveillance Technologies? Dr. Stephen Lee, Chief Scientist U.S. Army Research Office

Upload: kallman-worldwide-inc

Post on 20-Jun-2015

200 views

Category:

Education


0 download

DESCRIPTION

Presented at USA-SOUTH AFRICA: BORDER SURVEILLANCE AND ANTI-POACHING TECHNOLOGY COOPERATION SYMPOSIUM Dr. Stephen Lee, Chief Scientist U.S. Army Research Office

TRANSCRIPT

Page 1: What are Appropriate Border Surveillance Technologies?

What are Appropriate Border Surveillance Technologies?

Dr. Stephen Lee, Chief Scientist

U.S. Army Research Offi ce

Page 2: What are Appropriate Border Surveillance Technologies?

SEPTEMBER 16, 2014 • PRETORIA, SOUTH AFRICA

United States – South AfricaBorder Surveillance Technology

Cooperation Symposium

Dr. Stephen Lee, Chief ScientistU.S. Army Research Office

Page 3: What are Appropriate Border Surveillance Technologies?

3

Agenda

• U.S. ARO Overview• Counter Poaching Perspective• Projects Being investigated• Observations

Page 4: What are Appropriate Border Surveillance Technologies?

-

U.S. Army Research OfficeOverview

• Utilize the vast intellectual capital of our nation’s universities to:

• Exploit scientific opportunities for revolutionary new Army capabilities

• Drive science to develop solutions to existing Army technology needs

• Accelerate transition of basic research

• Strengthen university, industry, government partnerships

• Educate and train the future S&E workforce for the Army

Research ranges from atom optics for underground bunker/tunnel detection to nano-energetics for more powerful and insensitive

munitions and propellants

• 293 Institutes of higher learning • 1093 Individual investigators • 47 Research centers

Chemistry Computing and

Info Science Electronics Environmental Life Sciences

Materials Mathematics Mechanics Network Science Nanoscience Physics

Research Thrusts

Page 5: What are Appropriate Border Surveillance Technologies?

U.S. Army Research OfficeOrganization

Director

EngineeringSciences

PhysicalSciences

OperationsDirectorate

InformationSciences

SupportManagement Physics Mechanical

SciencesMathematical

Science

InformationManagement Chemistry Materials

ScienceComputational

Sciences

AcquisitionCenter

LifeSciences Electronics Network

Sciences

EnvironmentalSciences

OutreachPrograms

Military Deputy

Chief Scientist

Legal Counsel

Special Assistant

ARO executes the majority of ARL’s university research

~ 100 employees at RTP, NC

44 PhD Program Managers

Page 6: What are Appropriate Border Surveillance Technologies?

U.S. Army Research OfficeInternational Cooperation

Page 7: What are Appropriate Border Surveillance Technologies?

Perspective:The U.S. Army Faces Similar Challengesto those of Counter Poaching Activities

Perspective:The U.S. Army Faces Similar Challengesto those of Counter Poaching Activities

ONE of 1,000+ in South Africa in 2013

CounterNarcotics

Organized

Crime

Terrorism

Cross-BorderSanctuaries

Infiltration

Large AreaSurveillance

Small Unit ConflictMoney Laundering

Smuggling

AdvancedWeapons

ChemicalWeapons

Inadequate

Budgets

Guerilla Tactics

Command &

Control

Own the NightIntelligence

Border Control Gate/PortalControl

CounterInsurgency

Friendly ForceTracking

Page 8: What are Appropriate Border Surveillance Technologies?

To Win, we need to get ahead of the ActTo Win, we need to get ahead of the Act

Counter Improvised Explosive Device

Counter Poaching

Acquire & Store

Transport

BombBuilder

Transport Device

Concealment

Detonation

The Act

AcquireTrain

Recruit

Spot

Infiltrate

Page 9: What are Appropriate Border Surveillance Technologies?

Organized Crime / State-sponsored Corruption

Poachers

LocalHandlers

LocalTransport

NationalTransport

InternationalTransport Manufacturers Suppliers

Consumers

Poaching Supply Chain

Counter PoachingR&D Technical Framework

Counter PoachingR&D Technical Framework

IndigenousInitiated

Page 10: What are Appropriate Border Surveillance Technologies?

Organized Crime / State-sponsored Corruption

Poachers

LocalHandlers

LocalTransport

NationalTransport

InternationalTransport Manufacturers Suppliers

IndigenousInitiated

Night Vision

UAVs, Aerostats Dyes

Unattended Sensors GPS Tags

Horse-Dog Teams Ethnographic Analysis

RFID Proximity Tags Forward-Deployed Forensic Labs

Poaching Supply Chain

Consumers

Counter PoachingR&D Technical Framework

Counter PoachingR&D Technical Framework

PoachingPoaching

Page 11: What are Appropriate Border Surveillance Technologies?

Organized Crime / State-sponsored Corruption

Poachers

LocalHandlers

LocalTransport

NationalTransport

InternationalTransport Manufacturers Suppliers

Contraband Detectors

GPS Tags & Seals

Beef Test

IndigenousInitiated

Poaching Supply Chain

Consumers

Counter PoachingR&D Technical Framework

Counter PoachingR&D Technical Framework

TransportationTransportation

Page 12: What are Appropriate Border Surveillance Technologies?

Organized Crime / State-sponsored Corruption

Poachers

LocalHandlers

LocalTransport

NationalTransport

InternationalTransport Manufacturers Suppliers

EthnographicAnalysis

IndigenousInitiated

Poaching Supply Chain

Consumers

Counter PoachingR&D Technical Framework

Counter PoachingR&D Technical Framework

ConsumerConsumer

Page 13: What are Appropriate Border Surveillance Technologies?

Counter Poaching Funding StatusU.S. Army R&D Technical InitiativesCounter Poaching Funding StatusU.S. Army R&D Technical Initiatives

Current Funding StatusFunded

Partially Funded **

Poaching Supply Chain

Contraband Detectors

GPS Tags & Seals

Beef Test

Demonstrations of existing Army Technologies & Systems **

Organized Crime / State-sponsored Corruption

Poachers

LocalHandlers

LocalTransport

NationalTransport

InternationalTransport Manufacturers Suppliers

IndigenousInitiated

Consumers

Night Vision

UAVs, Aerostats Dyes

Unattended Sensors ** GPS Tags

Horse-Dog Teams Ethnographic Analysis

RFID Proximity Tags Forward-Deployed Forensic Labs

EthnographicAnalysis

Page 14: What are Appropriate Border Surveillance Technologies?

Contraband DetectionRhino Horn Sensing

Contraband DetectionRhino Horn Sensing

Supported by U.S. Fish & Wildlife Service and White Oak

Page 15: What are Appropriate Border Surveillance Technologies?

Prototype Beef TestDiscriminate Game Meat

Prototype Beef TestDiscriminate Game Meat

ObjectiveTo develop and field test a rapid analysis tool (~2 hours) to discriminate between “beef” and game meat to interdict poaching

Draw a Genetic Line

Positive on test identifies Cattle (Bos Taurus) or Zebu (Bos Indicus) or hybrids

Negative on test indicatesNOT Cattle (Bos Taurus) and NOT Zebu (Bos Indicus). Further laboratory testing is required to identify species.

Page 16: What are Appropriate Border Surveillance Technologies?

Unattended SensorsDoppler Radar for ID & Tracking

Unattended SensorsDoppler Radar for ID & Tracking

rScene®Micro RadarClassificationAlgorithms

Supported by NC Zoo and MCQ Inc.

Page 17: What are Appropriate Border Surveillance Technologies?

Unattended SensorsDoppler Radar for ID & Tracking

Unattended SensorsDoppler Radar for ID & Tracking

Supported by NC Zoo and MCQ Inc.

ElephantRhino

Dog

Time

Freq

uenc

y

• Objective to develop and field test a system for monitoring and tracking people, vehicles, and target animals.

• Distinct animal signatures collected.• Each radar can monitor an area of

approximately 100 by 300m• Radar can be complemented with seismic,

acoustic, magnetic, and cameras

Page 18: What are Appropriate Border Surveillance Technologies?

Final ObservationsFinal Observations

Dr. Stephen LeeChief Scientist

U.S. Army Research Office

[email protected]

919-549-4365

P.O. Box 12211

Research Triangle Park, North Carolina

USA 27709-2211

www.aro.army.mil

ObservationsObservations