ororsto1 110104 Forttort101014 101010101 1010101
101010101 1010101
0101110111010 frortto1
D o1o1toro101
OTE
PRICE)
IDEFENDER
IDE Surveillance & Critical
Infrastructure Protection SolutionINTRACOM
Defense Electronics
rN)
Protection of critical infrastructures, natural resources,
energy reservoirs alongside with protection of national
borders is the prime concer for a well-organized state,
The majority of man made threats and terrorist attacks,
which result significant asymmetric impact, are
executed against critical infrastructure and national
borders. Supply chain disruption and illicit immigration
are the two most important problems which cannot be
tolerated by any organized state,
To mitigate the aforementioned threats, modern
security systems shall be deployed to provide:
+ Real time information transmission from any type of
environment or terrain
* Increased level of situational awareness
* Information fusion, tasking orders and post
processing analysis of events
* Pattern extraction and behavior prediction
Sensors
ie |
Overview
IDEFENDER is an integrated “turn-key” solution for
optimized surveillance and Critical Infrastructure Protection
addressing the management and mitigation of physical
securily threals, Ils openness can easily embody diversified
user requirements.
In order to accommodate different user requirements IDE
offers the DEFENDER Command and Control (iDEFENDER
2), a flexible and scalable C2 platform, with incremental
expansion capability and with the most competitive cost.
Several sensor technologies are integrated to detect,
recognize, track and classify multiple moving threats from
different areas of interest in the land and sea. Every sensor
output is connected in the iDEFENDER C2 platform and
every threat becomes geo-referenced with its precise
geographical coordinates,
iDEFENDER incorporates the state-of-
the-art in Command and Control
technology, logging-recording-
debriefing and agile-secure broadband
wireless communications.
\ /Main Features
+ Integrated turn-key solution
+ Threat detection on land and sea surface
+ Early warning and notification, situational awareness,
incident response and incident recovery
+ Detection of personnel, light vehicles, small boats
‘and low flying platforms at short, medium and long
ranges
+ Automatic threat classification without user
intervention
+ Optimized sensor deployment based on End User
‘custom requirements
+ High performance wide-area surveillance for day and
night reconnaissance operations
+ Abnormal behavior detection
+ Modular design and ease of integration with
different detection sensor technologies A
+ Upgradeable and customizable based on user needs
with minimal effort
Incremental expansion and engineering changes
with the most competitive cost
+ Intuitive graphical user interface
1, 24h/7d operation
IDEFENDER is a state-of-the art security solution and
complies with the most demanding End User
requirements in the following fields of operation:
Blue and Green Border
rae ie
Critical Infrastructure Protection
Bea tee)
Diner inane tc ie
System Architecture
IDEFENDER consists of discrete building blocks:
Command and Control
‘The iDEFENDER C2 platform enables the user for
information gathering, information sharing, data fusion,
common operation picture composition, centralized
sensor management, digital site imaging, GIS
presentation, video management from various feeds
along with object tracking and classification of various
threats and intruders,
Sensors
Thermal imaging, night vision, distance calculation, radio
direction finding, perimeter intrusion detection, radar
tracking and precise geo-referencing of threats are some
of the capabilites offered.
Intelligence Surveillance and Reconnaissance
(ISR) Platforms
Ground/Naval/Aeral platlorms with integrated radars,
‘electro-optical sensors and secure communications are
used for intelligence gathering and to support mobile
security command posts.
‘Communications
IDEFENDER seamlessly integrates with IDE’s wireless
broadband communications suite as well as with 3rd
parly communication systems, allowing real time transfer
of data from various sensors and from ISR platforms to
the command and control subsystem.
SituationalINTRACOM
Defense Electronics
iDEFENDER Command and Control
The Operational Gap
Many countries but even more agencies in the world have
nvested significant amount of money in security
equipment and detection sensor technologies, intrusion,
detection sensors, communication systems, public address
systems etc, In most cases the security equipment operate
1 standalone mode without being integrated to a
dedicated software platform optimized to support security
agencies and first responders in the public protection and
disaster relief sector.
The absence of software intelligence is responsible for
lack of centralized management, low level of situational
awareness and notification in addition to poor
coordination of operational resources. These create
significant overhead to system operators as well as
support and maintenance issues, but the most crucial is
the unavailability of system resources during critical event
management and decision making.
The Operational Need
IDEFENDER C2 provides significant operational
advantages to decision making authorities and incident
commanders. Real time information gathering from
several simultaneous sources is crucial in order to
construct the Common Operation Picture (COP). A mosaic
of information is created and is composed of sensor data,
communication means, tracking of resources, status
reports for various resources, situation assessment,
mapping data, mission plans and where needed
multimedia content.
Decision makers can perceive critical situations based on
facts and evidence which contain the most up to date
information from the field of the incident. Evaluation of
gathered information and analysis of threat is essential for
the planning of the actual mission. Overall, situational
awareness, notification, coordination and collaboration
with agencies and resources is the prime requirement of
iDEFENDER C2 in support of operational decision making,‘The main capabilities of IDEFENDER C2 are the following:
Incident Management
DEFENDER C2 has built-in functionality enabling the
operator to compose the operational picture of the
incident, define type, status and severity of the incident,
structure text oriented information, allow operator to
input data and execute preprogrammed measures after
processing of all the previous information.
Resources Management
IDEFENDER C2 can propose and/or filter resources based,
jurisdiction areas, geographical proximity, condition,
status, type, taining, availabilty, ete, The operator can
also set a hierarchical tree type resource plan and assign a
resource to another resource as well as create “chile!”
resources in already defined resource types.
Sensor Integration
The most common detection sensor technologies are
"integrated into the iDEFENDER C2, These
synchronized electro-optical systems, mari
ground surveillance radars, laser range find
direction finden CCTV; fire detettion sensors a¥ well as
seismic and vibration detection systems.
Information Fusion
Different sensor technologies that output trac
IIS, radafrradio direction finder, are fused
iDEFENDER C2. Fusion of tracks minimize amt
_ minimize operator involvement and achieves
of threat detection, better threat evaluation and precise
interception guidance.
iDEFENDER
Video Management
Pan-tilt-z00m (PTZ) control, video content analytics
(VCA) and projection of live video on terrain are some of
the most important capabilities of the iDEFENDER C2.
‘The operator can configure the performance criteria of
VCA algorithms, manage PTZ controls of several remote
video based sensors, stream live video and archive files
from the data base for EOP, Radar, CCTV.
GIs Presentation
The GIS module of the system utilizes 3D streaming,
technology and is capable to update information in real
time to all command centers in which itis installed.
Digital raster and vector data alongside with nautical
navigation charts are used by the system to visualize
precisely the geographical location of resources and
incidents in the land, sea and air
Communications Integration
munication technologies are
easily integrated to the (DEFENDER C2 platform. The
system has built in interfaces to enable connections to
digital funKeradiolianalog radio, telephone exchange
systems, But most importantly to broadband IP networks,
“like Spart@n, IDE's broadband radio system. Integration
with legacy and new data bases can easily be done.
iefing
feeds from Electro-optical systems,
e system records voice and data
cher consoles and operator
eens. DEFENDER C2 supports mission replay,
isand post processing of events.INTRACOM
Defense Electronics
Sensors
The most important detection sensor technologies that are integrated in the IDEFENDER are the following
Electro-Optical Sensors
+ Syncronized and Integrated solutions (CCD, Thermal Imaging,
Laser Range Finder etc.)
+ High performance stabilized observation payloads
Ee
Radar Sensors
+X, Sand C band operation
+ Wide area surveillance
+ Small target automatic detection and tracking
Intrusion Detection Sensors
+ Smart Fence Solutions, Underground / Underwater Protection,
Ultrasonic Barriers
+ Dual technology: IR and Microwave Solution
+ Seismic, ultrasonic, magnetic sensors
‘Communications
Communications, the vital spine of any system for
surveillance and critical infrastructure protection,
enables all subsystems to operate together,
ensuring formulation and sharing of situational
awareness in real-time and efficient coordination,
of all intervention and remediation processes.
(Des wrssbedbid 5Intelligence Surveillance and Reconnaissance
(ISR) Platforms
The ISR platforms are the most technologically advanced
tegrated products of IDE and best serve security,
surveillance and intelligence gathering operation:
Critical Infrastructure, land and sea borders and exclusive
economic zone protection. These are special purpose
platforms with fast deployable features, different
detection sensor technologies and secure
communications to propagate the information on the
move.
‘The following ISR platforms can be integrated in the
DEFENDER (iDEFENDER-ISR):
+ Ground Based Mobile Security Command Post (MSCP)
optimized for land and costal surveillance
+ Naval based Seaborne Surveillance Command Post
(CSCP) optimized for maritime patrol and coastal
surveillance operation
* Unmanned aerial vehicle optimized for airborne
surveillance of land terrain and sea surface
‘The iDEFENDER-ISR family is designed to be deployed for
routine and ad-hoc intelligence information gathering
‘operations. In extreme conditions more than one
platforms are assigned to the operation in order to
complement one another and obtain the highest level of
security alongside with the best capabilites in threat
detection, classification and tracking,
AIL DEFENDER-ISR platforms are equipped with
synchronized electro-optical systems incorporating CCD
and thermal imaging sensors, laser range finder, ground
surveillance andor maritime radar, radio direction finder,
secure broadband communications and hybrid electric,
power system,
IDEFENDERIDE
(Intracom Defen:
Renn ar)
nic company in the area
\ctical Communications, D:
TU Ramo Cer
ors Re)
cou Se comes
ops and produces state-of-the-art
Peers eke See on
acd lars rol s
rene CR ue npg
devices, command and control systems, data
Seu kc nom ET)
Econ eM aes eric Rate ate aiat
Eun UC Muench gaa
eee Cece Tan
Elle Meteo ele
the company participates in joint
AC eae Vs ae
duction programs in
PCRs
ear Une Cay
I INTRACOM INTRACOM S.A.
(OMleveBkcrous DEFENSE ELECTRONIC SYSTEMS
PRIVATE ENTERPRISE FOR PROVISION OF SECURITY SERVICES
21 Ken. Markopoulou Ave, R194 00 Kori, Ata, Greece
Tet -30 21046674000, ox: +30 210-6678001
‘e-mal:Infosintracomdefense.com
URL: wow intracomdetense.com