• Blog Archives

    White Paper-VTI: Data Acquisition and Functional Test

    When KTC has to secure a large perimeter or build and deliver systems which incorporate large complex units or units with subsystems which – if handled improperly or allowed to operate off spec – can injure or kill people (such as very high power x-ray systems), we must instrument the perimeter, the complex unit or the subsystems so that we can monitor, continuously, all aspects of the perimeter or unit. To do that we must employ proven data acquisition (DAQ) systems. Systems which track movement, temperatures and pressures, state-of-health of the instrumentation itself and so on. KTC searched variousContinue Reading

    White Paper-Perceptics: The Case Against Automated Anomaly Detection in Vehicle Inspections Process

    KTC again reaches out to Perceptics to continue this series of point papers on subjects we are frequently asked about. We asked our partner Perceptics (www.perceptics.com) to address the case against automated anomaly detection in vehicle inspections process. So, Phil, Jennie, Don – over to you… Thousands of facilities worldwide have vehicle identification and inspection processes as part of perimeter security protocols. Gate officers at these facilities may inspect hundreds of vehicles on a daily basis before granting vehicles and occupants access to the facility. But how do security managers maintain the highest standard of watchfulness, while avoiding monotony andContinue Reading

    White Paper-Perceptics: Why State Identification is Vital in License Plate Readers

    KTC is pleased to continue this series of point papers on subjects we are frequently asked about. For this we asked our partner Perceptics (www.perceptics.com) to address the issue of identifying the state of issue for license plates. Perceptics manages the highest accuracy rate of any vendor, even for vehicles traveling at road speeds (guaranteed at >95%) and still manages to identify the plate number and the state – quickly! So, Phil, Jennie, Don – over to you… Why State Identification is Vital in License Plate Readers for Access Control Vehicle identifications and inspections constitute key components of many perimeter and accessContinue Reading

    White Paper- A Box 4 U SAFETYsuite: Productivity Inside Blast Resistant Outside

    We are pleased to introduce Mr. Ross Draney, who heads up A Box 4 U’s Safety and Security Division , as he and the company’s founder discuss the SAFETYsuite and its underlying technology. KTC has chosen A Box 4 U based on our history providing safe spaces throughout our industry. We offer both a standard leasing fleet and custom SAFETYsuites which include: • Control Rooms • SCADA Node Structures • Change Rooms • Continue Reading

    HYTEC, Inc.

    HYTEC, Inc. Los Alamos, NM HYTEC is a DCAA-Audited, DOE-Audited and Approved, ISO 9001-2000 Certified manufacturer and integrator of radiation detection, x-ray and neutron beam 2D and 3D imaging systems, and advanced sensors. Our user software won the coveted R&D 100 Award in 2003. For this meeting, I have chosen to pull into three (3) pages an overview of several key points. I look forward to having an opportunity to provide a full briefing. HYTEC, Lee Engineering, and MSIT believe we offer to your organization a set of critical technology assets bundled within a small business umbrella – thus providing to DOE another small business opportunity withoutContinue Reading
    Category:  News
    Leave a Comment

    KTC developed the DOE and Early DOD Port Scanners

    KTC Historical Development of Port Scanner (1990’s through 2003); in 2002-3 KTC began using the Varian HEPP System as its base system. Along the way there were several variants, leading up to the commercialised volumes. The early port and the original DOE systems were boxy like this; the cargo container on the right contained the control room. The port container cranes are visible in the distance, left. China Lake System (Navy) The first rail-based scanner built was used to perform secondary inspection – placed after the port scanner shown above. Later the rail scanner was placed onto the actual commercial railroad line, turnedContinue Reading
    Category:  News
    Leave a Comment

    White Paper-KTC and Cyber Defense: Why the Cyber Pearl Harbor Comment Should Hit Home

    The US Secretary of Defense is not known as a “hyper” person; it is hard to expect that he suddenly has fallen into hyperbole. Indeed, KTC has been working in cyber warfare and cyber defense for many years. Many other firms and many people have been as well. But the work has been mostly in the darkness, not only so-called “Black” programs – but literally in the closed office/carrel where someone sits glued to a computer screen. In fact most hackers are lone wolves, and most corporations and government groups think those wolves are their enemy and so they create a smallContinue Reading

    White Paper-Jamming at the Gate, Part Two

    In Part One (“Offensive Side”) we discussed the use of jamming technology to effect spectrum control and protection (active, purposeful denial or “blanking” of some or all of the communication frequencies of potential use by adversaries or Opposing Forces [OPFORS]). The “Defensive Side”, which is discussed here, is the OPFORS’ use of jammers designed to defeat Friendly Forces’ sensors and communication subsystems and the Counter-Electronic Countermeasures used to defeat these attacks. These countermeasures are often called PSIM or Physical Security Information Management – known to most designers of large scale security systems as the preferred all-encompassing electronic security system. “Physical Security Information Management,Continue Reading

    White Paper- Jamming at the Gate, Part One

    Not a reference to music but a hot topic nonetheless. This two-sided issue is often the “non-issue” or the topic professionals prefer to overlook or not discuss with clients. Side one (“Offense”): the use of jamming technology to effect spectrum control and protection (active, purposeful denial or “blanking” of some or all of the communication frequencies of potential use by adversaries or Opposing Forces [OPFORS]). All systems are monitored, extensively. IT Security   Side two (“Defense”): OPFORS’ use of jammers designed to defeat Friendly Forces’ sensors and communication subsystems and the Counter-Electronic Countermeasures used to defeat these attacks. This blog entry is focused onContinue Reading

    Welcome!

    Welcome to our site and to this blog. Our site is designed to present our capabilities and tell a bit about our history as a company. The blog, on the other hand, is designed to be a water cooler, a place where issues are discussed without regard to whether we created the tools or remedies discussed. For example, this may include past user solutions and commentary with the wisdom, lessons learned, or projected next steps. These blog posts are written by one or more members of our technical staff, advisers, or other experts. When the writer is not a member ofContinue Reading
    Category:  News  
    Tags: 
    Leave a Comment