AIT is exhibiting Safety & Security Technologies at Milipol, the worldwide leading event for Homeland Security in Paris
Milipol Paris is the leading event dedicated to homeland security. The 20th edition will be held on 21-24 November 2017 at Paris-Nord Villepinte Exhibition Centre. In 2015, and despite difficult circumstances, the event still succeeded in attracting no fewer than 949 exhibitors from 55 countries, 24,056 visitors from 143 countries and 115 official delegations from 77 countries.
And AIT is there! At booth nr. 6E090 the experts are presenting latest technologies for the protection of people and critical infrastructure - made in Austria.
Product lauch with Austrian industry partner ProCom-Strasser GmbH
ProCom-Strasser GmbH, an Austrian provider of IT security solutions and well-known security consultant for companies and authorities will also exhibit at AIT´s booth. The CEO Werner Strasser will introduce the market launch of fragmentiXTM. Together with cryptography experts from AIT Strasser developed a very new security device series enabling companies and authorities for the first time to get a simple tool for "information theoretically secure" storage of data in conventional cloud storage solutions.
Furthermore the experts will present innovations and solutions in the following fields of expertise:
Cyber Range – Capacity Building and Technology Validation at AIT
The growing complexity of our IT systems demands new mechanisms to protect them from advanced cyber attacks, to detect operational anomalies caused by complex system behaviour, and even to identify failures in operational processes made by IT system users. AIT experts are working on leading edge
technologies and solutions based on novel machine learning concepts appropriate to serve the future cyber defence ecosystem, in order to tackle the cyber threats arising from the emergence of comprehensive ICT networks, with their increasing interconnectedness and unclear attack surfaces.
But security is not just a technology issue – it encompasses processes, usability, operational skills and understanding system complexity. Together with the International Atomic Energy Agency (IAEA), AIT has established a "cyber range" training centre to share AIT´s extensive knowledge and to train and raise all stakeholders from industry, science and the public sector to a common level of knowledge. A cyber range is a virtual environment for the flexible simulation of large and complex networks with different system components, networks and users. It offers a safe and realistic environment to test, investigate and analyse incidents in various, scalable scenarios without using the actual production systems. With its flexible architecture, a cyber range can be used for diverse applications such as training, evaluation of incident response processes, and software testing. This allows researchers and stakeholders from industry and government to work together within realistic environments on the design, implementation and validation of methods, technologies and processes for establishing an increased level of defence against cyber attacks.
Digital Identity Management
Based on AIT´s internationally recognized experience in the field of smart border control, and as a coordinator of major EU-funded projects in this context (e.g. FastPass, MobilePass), experts at AIT are working on solutions and prototypes for identifying individuals on the move. Ingenious algorithms are combined with 3D stereo data to create access control solutions ranging from low to high security applications. The experts implement contactless biometric solutions in mobile devices to ease the work of Law Enforcement Agencies (LEAs) and other safeguards. The new approach for the contactless capture of fingerprints using a mobile device enhances security, speeds up the border control process, and makes biometric verification less cumbersome to individuals and officials.
Crisis and Disaster Management
Through the increasing integration of data collection intelligence in form of sensors or cameras at catastrophe critical locations, immense data amounts are collected and electronically saved. But what is frequently missing, is on the one hand the structuredness and therefore better interpretation of this data and on the other hand a cross-domain access by different crisis actors. AIT is especially focusing on solutions on public safety, disaster prevention as well as disaster management due to advanced sensor and communication systems among different stakeholders but also with the population of the country. Especially the communication systems with the population as well as the interoperability of systems of different stakeholders, and NGOs, even across national boundaries in line with advanced visualization technologies are of fundamental importance for a modern future proof crisis and disaster management.
To give an example AIT experts developed a crowd tasking platform for future crisis and disaster management. The aim of the innovation is to optimise the deployment of volunteers and to increase the resilience of the population in crisis and disaster situations. The requirements of relief forces are aligned with today’s omnipresence of smartphones and mobile applications. The global affinity for new communication technologies is utilised for crisis and disaster management. This challenge was resolved in an exemplary manner: to deal with major events and disasters, social media features were combined with command and control architectures of emergency organisations on a value-adding and effective communication platform, with special consideration of societal, legal and social aspects.
Protection of Critical Infrastructure
Coming back to AIT’s huge expertise in the field of data collection intelligence in form of sensors or cameras at catastrophe critical locations, experts are working on solutions in the field of local situation awareness in real time for security forces in disaster and crisis missions. The focus of the research activities is a real-time scanning of an e.g. contaminated area to achieve fast situation and risk awareness to support the safe and efficient deployment of first responders. A novel airborne laser scanner is mounted on an unmanned aerial vehicle (UAV). The data is combined with existing information from on-board sensors (e.g. gas and radiation detectors) for the exploration of disaster areas and detection of possible risks (e.g. high contamination levels) for safe search and rescue activities. The experts developed the real-time representation of the 3D information (e.g. visual, radiation, chemical, position) and continuous visualization in the form of a 3D information map on mobile terminals (e.g. handheld devices) for responders. The whole system has been evaluated in close cooperation with the Austrian Ministry of Defence Ministry.
Data Science Solutions
In the area of blockchain technology and virtual currencies AIT has positioned successfully itself as an internationally recognized player and is leadling major EU initiatives like the recently startet €5 million project TITANIUM (Tools for the Investigation of Transactions in Underground Markets) which aims at at developing technical solutions for investigating and mitigating crime and terrorism involving virtual currencies and underground market transactions. The AIT experts are working on algorithmic solutions which can provide insight into functionality and transaction flows for the real-time analysis of virtual currency transactions. A particular focus lies in the detection of „anomalies“, i.e. the identification of transactions and transaction patterns that deviate from the usual structures. The aim is to leverage the advantages of technology and prevent potential abuse.
Smart Encryption for IoT and Cloud Systems
When it comes to storage and processing, big companies and public authorities are reluctant to entrust their most sensitive data to external parties. AIT experts are working on concepts to better protect data in the cloud by means of novel agile cryptography. They are designing secure cloud services which
support collaborative work on cryptographically-protected data, i.e., with support for selective fine grained access control and built-in resiliency. Furthermore, they are developing privacy-enhancing technologies which are used to build trustworthy identity management systems and privacy-friendly smart applications for cloud computing and the Internet of Things (IoT).