SlideShare a Scribd company logo
What’s inside that building?
© Crown copyright 2015 Dstl
10 July 2015
Background
• We seek novel techniques to remotely provide
information about the layout and situation inside a
building or underground facility
• We’re interested in technologies and methods to
gather any information that contributes to our overall
awareness
• Seeking low technology readiness level (TRL) (2-3)
concepts
• Demonstration outputs will be favoured
© Crown copyright 2015 Dstl
10 July 2015
Military context
© Crown copyright 2015 Dstl
10 July 2015
Pre-2005
© Crown copyright 2015 Dstl
10 July 2015
Pre-2005
© Crown copyright 2015 Dstl
10 July 2015
Pre-2005
© Crown copyright 2015 Dstl
10 July 2015
Pre 2005
© Crown copyright 2015 Dstl
10 July 2015
Pre 2005
© Crown copyright 2015 Dstl
10 July 2015
Then along came this…
© Crown copyright 2015 Dstl
10 July 2015
Today
© Crown copyright 2015 Dstl
10 July 2015
Today
© Crown copyright 2015 Dstl
10 July 2015
Today
© Crown copyright 2015 Dstl
10 July 2015
Today
© Crown copyright 2015 Dstl
10 July 2015
Today
© Crown copyright 2015 Dstl
10 July 2015
Today
© Crown copyright 2015 Dstl
10 July 2015
Today
© Crown copyright 2015 Dstl
10 July 2015
Today
© Crown copyright 2015 Dstl
10 July 2015
Today ?
© Crown copyright 2015 Dstl
10 July 2015
Today
© Crown copyright 2015 Dstl
10 July 2015
Not just terrorism
© Crown copyright 2015 Dstl
10 July 2015
The CDE competition
© Crown copyright 2015 Dstl
10 July 2015
What’s inside that building?
• Detecting concealed manufacturing activity
© Crown copyright 2015 Dstl
10 July 2015
What’s inside that building?
• Finding out about internal building structure
© Crown copyright 2015 Dstl
10 July 2015
What’s inside that building?
• Identifying illegal storage activities
© Crown copyright 2015 Dstl
10 July 2015
What’s inside that
building?
• Working out the number of
people in a building and
what they are doing
© Crown copyright 2015 Dstl
10 July 2015
What’s inside that building?
• Detecting people who are hiding or being held against
their will
© Crown copyright 2015 Dstl
10 July 2015
What’s inside that building?
• Supporting disaster relief
© Crown copyright 2015 Dstl
10 July 2015
Technology challenges
• Challenge 1: traditional sensing methods
All sensing methods that try to directly measure properties of
interest
• Challenge 2: non-standard technologies and
approaches
Technologies and approaches that allow information of interest
to be inferred through indirect measurements
© Crown copyright 2015 Dstl
10 July 2015
Traditional sensing methods
Electromagnetic
© Crown copyright 2015 Dstl
10 July 2015
Traditional sensing methods
Acoustic / seismic
© Crown copyright 2015 Dstl
10 July 2015
Traditional sensing methods
• magnetic / gravitational
© Crown copyright 2015 Dstl
10 July 2015
Non-standard technologies
Inference from indirect measurements
© Crown copyright 2015 Dstl
10 July 2015
What we want
• technologies and methods that are covert and work
remotely. We want proposals that can substantiate
claims of robust performance at ranges of over 100
metres
© Crown copyright 2015 Dstl
10 July 2015
What we want
• non-standard technologies and approaches that
contribute substantially to building up an
understanding of what is inside a building, perhaps by
combining a number of elements
© Crown copyright 2015 Dstl
10 July 2015
What we want
• projects that complete with a technology
demonstration will be favoured over projects with only
written-word output
© Crown copyright 2015 Dstl
10 July 2015
What we want
• innovative proposals are welcomed but you should
state clearly the technology developments needed to
realise the innovation and the expected timescale for
technology maturation
© Crown copyright 2015 Dstl
10 July 2015
What we don’t want
• established techniques for sensing through walls when
in the proximity of the building will not be considered,
eg hand-held radar sensors
© Crown copyright 2015 Dstl
10 July 2015
What we don’t want
• trivial examples of non-standard technologies and
approaches that provide only a very limited amount of
information
• projects where the principal output is a literature
review
© Crown copyright 2015 Dstl
10 July 2015
What we don’t want
• projects that have little innovation will not be funded
However projects that propose a novel approach to
the exploitation of existing technology will be
considered.
© Crown copyright 2015 Dstl
10 July 2015
What we don’t want
• timescales for this competition are too constrained to
consider PhD projects, however, we would consider
small feasibility studies that might lead to a PhD
project
© Crown copyright 2015 Dstl
10 July 2015
Technical partners
Dstl will be available to provide advice and/or guidance
via an appointed technical partner throughout the project
and provide the interface with MOD and wider
government stakeholder community
© Crown copyright 2015 Dstl
10 July 2015
Important dates
• webinar at 1.30pm on Thursday 16 July 2015
• competition closes at 5pm on Thursday 10 September
2015
• proposals submitted using CDE portal
mark proposals with ‘What’s inside that building (+ challenge
number)’
• contract placement initiated and feedback provided in
November 2015
• phase-1 projects to complete by 28 August 2016
© Crown copyright 2015 Dstl
10 July 2015
Stakeholder event
• at the end of phase 1, successfully funded projects will
be asked to demonstrate their technology at a
stakeholder event in September 2016 at Dstl Porton
Down to support wider exploitation through Dstl and
MOD
• bidders should cost this into their proposals
© Crown copyright 2015 Dstl
10 July 2015
Further information
• total budget for phase 1 up to £650,000
• projects of value between £50,000 to £100,000
favoured
• expect to take forward the 3-4 best projects into phase
2
• technical queries: RIBICDE@dstl.gov.uk
• general queries: cde@dstl.gov.uk
• Acknowledgment: Public domain graphics obtained via Wikimedia Commons
© Crown copyright 2015 Dstl
10 July 2015
Innovation Network event
9 July 2015

More Related Content

PPTX
bcom Global Overview
PPTX
Accellion TechEd - Social Media
PPTX
"e-Infrastructures - The Starting Blocks for Open Science and Innovation"
PPTX
Q4 2014 survey of projects no univ
PDF
SW360 Update Tooling Telco
PPTX
12th Meeting OpenChain Reference Tooling Work Group - 25th March - Slides
PDF
Git- Fast version control system
PPTX
Open Access Week 2015 by OpenAIRE
bcom Global Overview
Accellion TechEd - Social Media
"e-Infrastructures - The Starting Blocks for Open Science and Innovation"
Q4 2014 survey of projects no univ
SW360 Update Tooling Telco
12th Meeting OpenChain Reference Tooling Work Group - 25th March - Slides
Git- Fast version control system
Open Access Week 2015 by OpenAIRE

Similar to 9 July 2015: What's inside that building? (16)

PPTX
9 July 2015: CDE enduring challenge competition
PDF
Precision Timing and Navigation - CDE themed call launch 23 April 2013
PDF
Seeing through the clouds themed competition 30 June 2016
PDF
13 January 2015: Highly robust ground platforms CDE themed competition
PDF
27 Nov 2013 CDE enduring challenge competition briefings
PDF
18 Dec 2013 - CDE enduring challenge competition webinar
PDF
18 November 2014: affordable space-based capability CDE themed competition
PPTX
8 July 2015: Persistent surveillance from the air themed competition
PDF
Smart and multifunctional micro- and nano-scale materials for defence and sec...
PPTX
9 July 2015: Understand and interact with cyberspace themed competition
PDF
AM Briefing: Autonomy and big data for defence
PDF
Anticipating a hostile reaction for Augmented Reality
PDF
CDE future sonar webinar
PDF
AM Briefing: Security for the internet of things
PDF
13 January 2015: Enduring challenge briefings
PDF
27 Nov 2013 Cyber defence CDE themed competition presentations
9 July 2015: CDE enduring challenge competition
Precision Timing and Navigation - CDE themed call launch 23 April 2013
Seeing through the clouds themed competition 30 June 2016
13 January 2015: Highly robust ground platforms CDE themed competition
27 Nov 2013 CDE enduring challenge competition briefings
18 Dec 2013 - CDE enduring challenge competition webinar
18 November 2014: affordable space-based capability CDE themed competition
8 July 2015: Persistent surveillance from the air themed competition
Smart and multifunctional micro- and nano-scale materials for defence and sec...
9 July 2015: Understand and interact with cyberspace themed competition
AM Briefing: Autonomy and big data for defence
Anticipating a hostile reaction for Augmented Reality
CDE future sonar webinar
AM Briefing: Security for the internet of things
13 January 2015: Enduring challenge briefings
27 Nov 2013 Cyber defence CDE themed competition presentations
Ad

More from Defence and Security Accelerator (20)

PPTX
DASA Security Showcase - Department for International Trade Presentation
PPTX
DASA Security Showcase - UK Fire Service Presentation
PPTX
DASA Security Showcase - Department for Transport and Home Office Presentation
PPTX
DASA Security Showcase - DASA Presentation
PPTX
DASA Security Showcase - Bank of England Presentation
PDF
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
PPTX
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
PDF
27 July 2017 Innovation nework event: how to create a great proposal
PDF
27 July 2017 Innovation nework event: Working with the Accelerator
PDF
Improving crowd resilience themed competition slides
PPTX
Accelerator First Innovation Fund network event Session 1
PDF
CDE themed comp -syn-bio part 2
PDF
CDE themed comp - synbio part 1
PPTX
Beyond battery power: future autonomy
PDF
CDE themed challenge - Beyond battery power: the technical challenge and futu...
PPTX
Beyond battery power - CDE themed competition part 2
PPTX
Beyond battery power - CDE themed competition part 1
PPTX
Beyond battery power - how the competition will work
PPTX
Introduction to the Centre for Defence Enterprise and introducing the Defence...
PDF
CDE Competition on FASS - technology challenge 1
DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - DASA Presentation
DASA Security Showcase - Bank of England Presentation
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: Working with the Accelerator
Improving crowd resilience themed competition slides
Accelerator First Innovation Fund network event Session 1
CDE themed comp -syn-bio part 2
CDE themed comp - synbio part 1
Beyond battery power: future autonomy
CDE themed challenge - Beyond battery power: the technical challenge and futu...
Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 1
Beyond battery power - how the competition will work
Introduction to the Centre for Defence Enterprise and introducing the Defence...
CDE Competition on FASS - technology challenge 1
Ad

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Spectroscopy.pptx food analysis technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
cuic standard and advanced reporting.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Network Security Unit 5.pdf for BCA BBA.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Building Integrated photovoltaic BIPV_UPV.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
Spectral efficient network and resource selection model in 5G networks
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectroscopy.pptx food analysis technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Big Data Technologies - Introduction.pptx
Understanding_Digital_Forensics_Presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation theory and applications.pdf
sap open course for s4hana steps from ECC to s4
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf

9 July 2015: What's inside that building?

  • 1. What’s inside that building? © Crown copyright 2015 Dstl 10 July 2015
  • 2. Background • We seek novel techniques to remotely provide information about the layout and situation inside a building or underground facility • We’re interested in technologies and methods to gather any information that contributes to our overall awareness • Seeking low technology readiness level (TRL) (2-3) concepts • Demonstration outputs will be favoured © Crown copyright 2015 Dstl 10 July 2015
  • 3. Military context © Crown copyright 2015 Dstl 10 July 2015
  • 4. Pre-2005 © Crown copyright 2015 Dstl 10 July 2015
  • 5. Pre-2005 © Crown copyright 2015 Dstl 10 July 2015
  • 6. Pre-2005 © Crown copyright 2015 Dstl 10 July 2015
  • 7. Pre 2005 © Crown copyright 2015 Dstl 10 July 2015
  • 8. Pre 2005 © Crown copyright 2015 Dstl 10 July 2015
  • 9. Then along came this… © Crown copyright 2015 Dstl 10 July 2015
  • 10. Today © Crown copyright 2015 Dstl 10 July 2015
  • 11. Today © Crown copyright 2015 Dstl 10 July 2015
  • 12. Today © Crown copyright 2015 Dstl 10 July 2015
  • 13. Today © Crown copyright 2015 Dstl 10 July 2015
  • 14. Today © Crown copyright 2015 Dstl 10 July 2015
  • 15. Today © Crown copyright 2015 Dstl 10 July 2015
  • 16. Today © Crown copyright 2015 Dstl 10 July 2015
  • 17. Today © Crown copyright 2015 Dstl 10 July 2015
  • 18. Today ? © Crown copyright 2015 Dstl 10 July 2015
  • 19. Today © Crown copyright 2015 Dstl 10 July 2015
  • 20. Not just terrorism © Crown copyright 2015 Dstl 10 July 2015
  • 21. The CDE competition © Crown copyright 2015 Dstl 10 July 2015
  • 22. What’s inside that building? • Detecting concealed manufacturing activity © Crown copyright 2015 Dstl 10 July 2015
  • 23. What’s inside that building? • Finding out about internal building structure © Crown copyright 2015 Dstl 10 July 2015
  • 24. What’s inside that building? • Identifying illegal storage activities © Crown copyright 2015 Dstl 10 July 2015
  • 25. What’s inside that building? • Working out the number of people in a building and what they are doing © Crown copyright 2015 Dstl 10 July 2015
  • 26. What’s inside that building? • Detecting people who are hiding or being held against their will © Crown copyright 2015 Dstl 10 July 2015
  • 27. What’s inside that building? • Supporting disaster relief © Crown copyright 2015 Dstl 10 July 2015
  • 28. Technology challenges • Challenge 1: traditional sensing methods All sensing methods that try to directly measure properties of interest • Challenge 2: non-standard technologies and approaches Technologies and approaches that allow information of interest to be inferred through indirect measurements © Crown copyright 2015 Dstl 10 July 2015
  • 29. Traditional sensing methods Electromagnetic © Crown copyright 2015 Dstl 10 July 2015
  • 30. Traditional sensing methods Acoustic / seismic © Crown copyright 2015 Dstl 10 July 2015
  • 31. Traditional sensing methods • magnetic / gravitational © Crown copyright 2015 Dstl 10 July 2015
  • 32. Non-standard technologies Inference from indirect measurements © Crown copyright 2015 Dstl 10 July 2015
  • 33. What we want • technologies and methods that are covert and work remotely. We want proposals that can substantiate claims of robust performance at ranges of over 100 metres © Crown copyright 2015 Dstl 10 July 2015
  • 34. What we want • non-standard technologies and approaches that contribute substantially to building up an understanding of what is inside a building, perhaps by combining a number of elements © Crown copyright 2015 Dstl 10 July 2015
  • 35. What we want • projects that complete with a technology demonstration will be favoured over projects with only written-word output © Crown copyright 2015 Dstl 10 July 2015
  • 36. What we want • innovative proposals are welcomed but you should state clearly the technology developments needed to realise the innovation and the expected timescale for technology maturation © Crown copyright 2015 Dstl 10 July 2015
  • 37. What we don’t want • established techniques for sensing through walls when in the proximity of the building will not be considered, eg hand-held radar sensors © Crown copyright 2015 Dstl 10 July 2015
  • 38. What we don’t want • trivial examples of non-standard technologies and approaches that provide only a very limited amount of information • projects where the principal output is a literature review © Crown copyright 2015 Dstl 10 July 2015
  • 39. What we don’t want • projects that have little innovation will not be funded However projects that propose a novel approach to the exploitation of existing technology will be considered. © Crown copyright 2015 Dstl 10 July 2015
  • 40. What we don’t want • timescales for this competition are too constrained to consider PhD projects, however, we would consider small feasibility studies that might lead to a PhD project © Crown copyright 2015 Dstl 10 July 2015
  • 41. Technical partners Dstl will be available to provide advice and/or guidance via an appointed technical partner throughout the project and provide the interface with MOD and wider government stakeholder community © Crown copyright 2015 Dstl 10 July 2015
  • 42. Important dates • webinar at 1.30pm on Thursday 16 July 2015 • competition closes at 5pm on Thursday 10 September 2015 • proposals submitted using CDE portal mark proposals with ‘What’s inside that building (+ challenge number)’ • contract placement initiated and feedback provided in November 2015 • phase-1 projects to complete by 28 August 2016 © Crown copyright 2015 Dstl 10 July 2015
  • 43. Stakeholder event • at the end of phase 1, successfully funded projects will be asked to demonstrate their technology at a stakeholder event in September 2016 at Dstl Porton Down to support wider exploitation through Dstl and MOD • bidders should cost this into their proposals © Crown copyright 2015 Dstl 10 July 2015
  • 44. Further information • total budget for phase 1 up to £650,000 • projects of value between £50,000 to £100,000 favoured • expect to take forward the 3-4 best projects into phase 2 • technical queries: RIBICDE@dstl.gov.uk • general queries: cde@dstl.gov.uk • Acknowledgment: Public domain graphics obtained via Wikimedia Commons © Crown copyright 2015 Dstl 10 July 2015

Editor's Notes

  • #46: Holding slide. [NEXT]